https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.html A vulnerability in charon-tkm related to processing DH public values was discovered in strongSwan that can result in a buffer overflow and potentially remote code execution. All versions since 5.3.0 are affected. Fixed in 5.9.12. Newest version in the tree is 5.9.11.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=341486cf27f6090c2ac643374be6bb20cfec1f35 commit 341486cf27f6090c2ac643374be6bb20cfec1f35 Author: John Helmert III <ajak@gentoo.org> AuthorDate: 2024-07-06 04:57:23 +0000 Commit: John Helmert III <ajak@gentoo.org> CommitDate: 2024-07-06 04:58:37 +0000 net-vpn/strongswan: drop 5.9.11 Bug: https://bugs.gentoo.org/920105 Signed-off-by: John Helmert III <ajak@gentoo.org> net-vpn/strongswan/Manifest | 1 - net-vpn/strongswan/strongswan-5.9.11.ebuild | 318 ---------------------------- 2 files changed, 319 deletions(-)