File _patchinfo of Package patchinfo.11578
<patchinfo incident="11578">
<issue tracker="cve" id="2018-16151"/>
<issue tracker="cve" id="2018-5388"/>
<issue tracker="cve" id="2018-17540"/>
<issue tracker="cve" id="2018-10811"/>
<issue tracker="cve" id="2018-16152"/>
<issue tracker="bnc" id="1094462">VUL-0: CVE-2018-5388: strongswan: buffer underflow in stroke_socket.c</issue>
<issue tracker="bnc" id="1093536">VUL-0: CVE-2018-10811: strongswan: denial-of-service vulnerability in strongSwan</issue>
<issue tracker="bnc" id="1107874">VUL-0: CVE-2018-16151, CVE-2018-16152: strongswan: several flaws in the gmp plugin that may lead to an authorization bypass vulnerability</issue>
<issue tracker="bnc" id="1109845">VUL-0: CVE-2018-17540: strongswan: Insufficient input validation in gmp plugin</issue>
<packager>mmnelemane</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for strongswan</summary>
<description>This update for strongswan fixes the following issues:
Security issues fixed:
- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker
with local user credentials to resource exhaustion and denial of service while
reading from the socket (bsc#1094462).
- CVE-2018-10811: Fixed a denial of service during the IKEv2 key derivation if
the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF
(bsc#1093536).
- CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin which
might lead to authorization bypass (bsc#1107874).
- CVE-2018-17540: Fixed an improper input validation in gmp plugin (bsc#1109845).
This update was imported from the SUSE:SLE-15:Update update project.</description>
</patchinfo>