File _patchinfo of Package patchinfo.11578

<patchinfo incident="11578">
  <issue tracker="cve" id="2018-16151"/>
  <issue tracker="cve" id="2018-5388"/>
  <issue tracker="cve" id="2018-17540"/>
  <issue tracker="cve" id="2018-10811"/>
  <issue tracker="cve" id="2018-16152"/>
  <issue tracker="bnc" id="1094462">VUL-0: CVE-2018-5388: strongswan: buffer underflow in stroke_socket.c</issue>
  <issue tracker="bnc" id="1093536">VUL-0: CVE-2018-10811: strongswan: denial-of-service vulnerability in strongSwan</issue>
  <issue tracker="bnc" id="1107874">VUL-0: CVE-2018-16151, CVE-2018-16152: strongswan: several flaws in the gmp plugin that may lead to an authorization bypass vulnerability</issue>
  <issue tracker="bnc" id="1109845">VUL-0: CVE-2018-17540: strongswan: Insufficient input validation in gmp plugin</issue>
  <packager>mmnelemane</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for strongswan</summary>
  <description>This update for strongswan fixes the following issues:

Security issues fixed: 

- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker 
  with local user credentials to resource exhaustion and denial of service while 
  reading from the socket (bsc#1094462).
- CVE-2018-10811: Fixed a denial of service during  the IKEv2 key derivation if 
  the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF 
  (bsc#1093536).
- CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin which 
  might lead to authorization bypass (bsc#1107874).
- CVE-2018-17540: Fixed an improper input validation in gmp plugin (bsc#1109845).  

This update was imported from the SUSE:SLE-15:Update update project.</description>
</patchinfo>