Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 551564 (CVE-2015-4171) - <net-misc/strongswan-5.3.2: information leak of user credentials (CVE-2015-4171)
Summary: <net-misc/strongswan-5.3.2: information leak of user credentials (CVE-2015-4171)
Status: RESOLVED FIXED
Alias: CVE-2015-4171
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://strongswan.org/blog/2015/06/08...
Whiteboard: B3 [noglsa/cve]
Keywords:
: 551558 551562 (view as bug list)
Depends on:
Blocks:
 
Reported: 2015-06-09 14:11 UTC by Sam James
Modified: 2015-08-04 15:29 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2015-06-09 14:11:15 UTC
From URL:
----
Alexander E. Patrakov recently reported a vulnerability in strongSwan that may enable rogue servers to obtain user credentials from a client in certain IKEv2 setups. Affected are all strongSwan versions since 4.3.0, up to 5.3.1.
----
http://www.openwall.com/lists/oss-security/2015/05/29/6
Vulnerable versions: >= 4.3.0, < 5.3.1.
Versions in tree:
5.3.2 (unstable) (invulnerable)
5.2.2 (stable) (vulnerable)

Could maintainers please:
1) stabilise 5.3.2
or
2) Apply http://download.strongswan.org/security/CVE-2015-4171/strongswan-5.1.0-5.3.1_enforce_remote_auth.patch (append .sig for PGP signature)

Reproducible: Always
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2015-06-09 14:12:21 UTC
*** Bug 551562 has been marked as a duplicate of this bug. ***
Comment 2 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2015-06-09 14:12:40 UTC
*** Bug 551558 has been marked as a duplicate of this bug. ***
Comment 3 Bjarke Istrup Pedersen (RETIRED) gentoo-dev 2015-06-09 16:26:37 UTC
5.3.1 is also vulnerable - which is why we already have 5.3.2 in the tree :-)

Please see: https://www.strongswan.org/blog/2015/06/08/strongswan-vulnerability-%28cve-2015-4171%29.html

Security team, please go ahead and stabilize 5.3.2, thanks.
Comment 4 Agostino Sarubbo gentoo-dev 2015-06-10 10:49:55 UTC
Arches, please test and mark stable:                                                                       
=net-misc/strongswan-5.3.2
Target keywords : "amd64 arm ppc x86"
Comment 5 Agostino Sarubbo gentoo-dev 2015-06-10 14:53:34 UTC
amd64 stable
Comment 6 Agostino Sarubbo gentoo-dev 2015-06-11 07:18:30 UTC
x86 stable
Comment 7 GLSAMaker/CVETool Bot gentoo-dev 2015-06-14 12:20:49 UTC
CVE-2015-4171 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4171):
  strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before
  1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2
  connection, does not enforce server authentication restrictions until the
  entire authentication process is complete, which allows remote servers to
  obtain credentials by using a valid certificate and then reading the
  responses.
Comment 8 Markus Meier gentoo-dev 2015-06-21 10:40:42 UTC
arm stable
Comment 9 Agostino Sarubbo gentoo-dev 2015-06-24 08:01:52 UTC
ppc stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 10 Bjarke Istrup Pedersen (RETIRED) gentoo-dev 2015-06-24 16:18:30 UTC
Done, old version removed.
Comment 11 Yury German Gentoo Infrastructure gentoo-dev 2015-06-30 20:38:09 UTC
Arches and Maintainer(s), Thank you for your work.

GLSA Vote: No
Comment 12 Kristian Fiskerstrand (RETIRED) gentoo-dev 2015-06-30 20:39:14 UTC
GLSA Vote: No