Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 818841 (CVE-2021-41991) - net-vpn/strongswan: integer overflow (CVE-2021-41991)
Summary: net-vpn/strongswan: integer overflow (CVE-2021-41991)
Alias: CVE-2021-41991
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
Whiteboard: B2 [ebuild]
Keywords: PullRequest
Depends on: 830060
  Show dependency tree
Reported: 2021-10-18 19:46 UTC by John Helmert III
Modified: 2022-01-02 14:22 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-10-18 19:46:47 UTC

The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.
Comment 1 Larry the Git Cow gentoo-dev 2022-01-02 14:15:52 UTC
The bug has been referenced in the following commit(s):

commit 7b2be9c86d3a38312e787a30291c46e30b2da3bb
Author:     Philipp Rösner <>
AuthorDate: 2021-12-29 22:46:06 +0000
Commit:     Florian Schmaus <>
CommitDate: 2022-01-02 14:15:30 +0000

    net-vpn/strongswan: bump to 5.9.4
    Added an ebuild for strongswan-5.9.4 with support for EAPI 8.
    Package-Manager: Portage-3.0.30, Repoman-3.0.3
    Signed-off-by: Philipp Roesner <>
    Signed-off-by: Florian Schmaus <>

 net-vpn/strongswan/Manifest                |   1 +
 net-vpn/strongswan/strongswan-5.9.4.ebuild | 308 +++++++++++++++++++++++++++++
 2 files changed, 309 insertions(+)