CVE-2021-41991: The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7b2be9c86d3a38312e787a30291c46e30b2da3bb commit 7b2be9c86d3a38312e787a30291c46e30b2da3bb Author: Philipp Rösner <rndxelement@protonmail.com> AuthorDate: 2021-12-29 22:46:06 +0000 Commit: Florian Schmaus <flow@gentoo.org> CommitDate: 2022-01-02 14:15:30 +0000 net-vpn/strongswan: bump to 5.9.4 Added an ebuild for strongswan-5.9.4 with support for EAPI 8. Bug: https://bugs.gentoo.org/818841 Package-Manager: Portage-3.0.30, Repoman-3.0.3 Signed-off-by: Philipp Roesner <rndxelement@protonmail.com> Signed-off-by: Florian Schmaus <flow@gentoo.org> net-vpn/strongswan/Manifest | 1 + net-vpn/strongswan/strongswan-5.9.4.ebuild | 308 +++++++++++++++++++++++++++++ 2 files changed, 309 insertions(+)