-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3663-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Chris Lamb November 24, 2023 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : strongswan Version : 5.7.2-1+deb10u4 CVE ID : CVE-2023-41913 It was discovered that there was a potential buffer overflow in strongswan, a IPsec-based VPN (Virtual Private Network) server. A vulnerability related to processing public Diffie-Hellman key exchange values could have resulted in a buffer overflow and potentially remote code execution as a result. For Debian 10 buster, this problem has been fixed in version 5.7.2-1+deb10u4. We recommend that you upgrade your strongswan packages. For the detailed security status of strongswan please refer to its security tracker page at: https://security-tracker.debian.org/tracker/strongswan Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmVgr8wACgkQHpU+J9Qx Hlj83A//eFCIdVGPJmc/iPtKqN/HJXhurQemRj+FAOXIMiMIYVx0/PgcagYdi9+l KTpzY3CEt7V+zkTkjRnRWz4KhQQCFzAbPwZiRRhlCCu73RCgLeOzuPZxDr7UOPy/ DrnE72L0YoMNWVhcskuT1vfpdrmtxu695d8pdbStDuztvQbQNCVg/vbalYs/nOPh GVQoXyaKxB1Kh4rOEG5kYodNRL9ig+Ay/zok5v0mgFlknV3rYBCXoyTKoMxFvcE3 Ea8H2avzcD9dLZrFI9ZOrr6wPrst9nhbgIxYQAFm12sny/KR119hepJrPfYI6txV NyfmPmxojkeV6HF4ypL2JGjx9RkCpJtjgeWhJcyG9C0H1Y9tV88DdyjEjnFDMm0/ LMwCKMluyQiYeU3D2anGE3FbQmoq9A4qCAkUEOQvj41s1nasfIqqM668OxXzGti0 zLPjC91za3HUgNbOGL9VRUsnJhY6Nr1ZN0OIHrRvb0jh6cyuaZr94WWyokzC62ZW 2X76BzbgWzOrmf7ktkiRUd84fzGB0M3wH3JYvWXKOOABoUygmRSOEjJWnEy4CdUm FWuznUhtXv2krK6/RvpIyxWH/JRUmx4ZxUq4j6S/meVS2wToqkCX8PktGJFkagfR McP32Cmm5Uh6utTo7CH4ZiNcZIaAwGtmE8e5wrrCBak57j3jRBw= =Ni/8 -----END PGP SIGNATURE-----