SUSE-SU-2019:3266-1: important: Security update for strongswan

sle-updates at lists.suse.com sle-updates at lists.suse.com
Wed Dec 11 07:18:40 MST 2019


   SUSE Security Update: Security update for strongswan
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:3266-1
Rating:             important
References:         #1009254 #1071853 #1093536 #1094462 #1107874 
                    #1109845 
Cross-References:   CVE-2018-10811 CVE-2018-16151 CVE-2018-16152
                    CVE-2018-17540 CVE-2018-5388
Affected Products:
                    SUSE OpenStack Cloud 8
                    SUSE OpenStack Cloud 7
                    SUSE Linux Enterprise Server for SAP 12-SP3
                    SUSE Linux Enterprise Server for SAP 12-SP2
                    SUSE Linux Enterprise Server for SAP 12-SP1
                    SUSE Linux Enterprise Server 12-SP5
                    SUSE Linux Enterprise Server 12-SP4
                    SUSE Linux Enterprise Server 12-SP3-LTSS
                    SUSE Linux Enterprise Server 12-SP3-BCL
                    SUSE Linux Enterprise Server 12-SP2-LTSS
                    SUSE Linux Enterprise Server 12-SP2-BCL
                    SUSE Linux Enterprise Server 12-SP1-LTSS
                    SUSE Linux Enterprise Desktop 12-SP4
                    SUSE Enterprise Storage 5
______________________________________________________________________________

   An update that solves 5 vulnerabilities and has one errata
   is now available.

Description:

   This update for strongswan provides the following fixes:

   Security issues fixed:

   - CVE-2018-5388: Fixed a buffer underflow which may allow to a remote
     attacker with local user credentials to resource exhaustion and denial
     of service while reading from the socket (bsc#1094462).
   - CVE-2018-10811: Fixed a denial of service during  the IKEv2 key
     derivation if the openssl plugin is used in FIPS mode and HMAC-MD5 is
     negotiated as PRF (bsc#1093536).
   - CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin
     which might lead to authorization bypass (bsc#1107874).
   - CVE-2018-17540: Fixed an improper input validation in gmp plugin
     (bsc#1109845).

   Other issues addressed:

   - Fixed some client fails when the scep server URL is used with HTTPS
     protocol (bsc#1071853).
   - Reject Diffie-Hellman key exchanges using primes smaller than 1024 bit.
   - Handle unexpected informational message from SonicWall. (bsc#1009254)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud 8:

      zypper in -t patch SUSE-OpenStack-Cloud-8-2019-3266=1

   - SUSE OpenStack Cloud 7:

      zypper in -t patch SUSE-OpenStack-Cloud-7-2019-3266=1

   - SUSE Linux Enterprise Server for SAP 12-SP3:

      zypper in -t patch SUSE-SLE-SAP-12-SP3-2019-3266=1

   - SUSE Linux Enterprise Server for SAP 12-SP2:

      zypper in -t patch SUSE-SLE-SAP-12-SP2-2019-3266=1

   - SUSE Linux Enterprise Server for SAP 12-SP1:

      zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-3266=1

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2019-3266=1

   - SUSE Linux Enterprise Server 12-SP4:

      zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-3266=1

   - SUSE Linux Enterprise Server 12-SP3-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-3266=1

   - SUSE Linux Enterprise Server 12-SP3-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2019-3266=1

   - SUSE Linux Enterprise Server 12-SP2-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2019-3266=1

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2019-3266=1

   - SUSE Linux Enterprise Server 12-SP1-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2019-3266=1

   - SUSE Linux Enterprise Desktop 12-SP4:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-3266=1

   - SUSE Enterprise Storage 5:

      zypper in -t patch SUSE-Storage-5-2019-3266=1



Package List:

   - SUSE OpenStack Cloud 8 (x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-hmac-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1

   - SUSE OpenStack Cloud 8 (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE OpenStack Cloud 7 (s390x x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-hmac-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1

   - SUSE OpenStack Cloud 7 (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-hmac-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1

   - SUSE Linux Enterprise Server for SAP 12-SP3 (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-hmac-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1

   - SUSE Linux Enterprise Server for SAP 12-SP2 (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-hmac-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1

   - SUSE Linux Enterprise Server for SAP 12-SP1 (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-hmac-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP5 (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-hmac-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP4 (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-hmac-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP3-LTSS (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP3-BCL (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-hmac-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-hmac-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP2-LTSS (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-hmac-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-hmac-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE Linux Enterprise Desktop 12-SP4 (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE Linux Enterprise Desktop 12-SP4 (x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1

   - SUSE Enterprise Storage 5 (noarch):

      strongswan-doc-5.1.3-26.13.1

   - SUSE Enterprise Storage 5 (x86_64):

      strongswan-5.1.3-26.13.1
      strongswan-debugsource-5.1.3-26.13.1
      strongswan-hmac-5.1.3-26.13.1
      strongswan-ipsec-5.1.3-26.13.1
      strongswan-ipsec-debuginfo-5.1.3-26.13.1
      strongswan-libs0-5.1.3-26.13.1
      strongswan-libs0-debuginfo-5.1.3-26.13.1


References:

   https://www.suse.com/security/cve/CVE-2018-10811.html
   https://www.suse.com/security/cve/CVE-2018-16151.html
   https://www.suse.com/security/cve/CVE-2018-16152.html
   https://www.suse.com/security/cve/CVE-2018-17540.html
   https://www.suse.com/security/cve/CVE-2018-5388.html
   https://bugzilla.suse.com/1009254
   https://bugzilla.suse.com/1071853
   https://bugzilla.suse.com/1093536
   https://bugzilla.suse.com/1094462
   https://bugzilla.suse.com/1107874
   https://bugzilla.suse.com/1109845



More information about the sle-updates mailing list