Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 818841 (CVE-2021-41991)

Summary: net-vpn/strongswan: integer overflow (CVE-2021-41991)
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: CONFIRMED ---    
Severity: normal CC: maintainer-needed
Priority: Normal Keywords: PullRequest
Version: unspecified   
Hardware: All   
OS: Linux   
See Also:
Whiteboard: B2 [ebuild]
Package list:
Runtime testing required: ---
Bug Depends on: 830060    
Bug Blocks:    

Description John Helmert III gentoo-dev Security 2021-10-18 19:46:47 UTC

The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.
Comment 1 Larry the Git Cow gentoo-dev 2022-01-02 14:15:52 UTC
The bug has been referenced in the following commit(s):

commit 7b2be9c86d3a38312e787a30291c46e30b2da3bb
Author:     Philipp Rösner <>
AuthorDate: 2021-12-29 22:46:06 +0000
Commit:     Florian Schmaus <>
CommitDate: 2022-01-02 14:15:30 +0000

    net-vpn/strongswan: bump to 5.9.4
    Added an ebuild for strongswan-5.9.4 with support for EAPI 8.
    Package-Manager: Portage-3.0.30, Repoman-3.0.3
    Signed-off-by: Philipp Roesner <>
    Signed-off-by: Florian Schmaus <>

 net-vpn/strongswan/Manifest                |   1 +
 net-vpn/strongswan/strongswan-5.9.4.ebuild | 308 +++++++++++++++++++++++++++++
 2 files changed, 309 insertions(+)