Fedora Linux 8782 Published by

A strongswan security update has been released for Fedora 34.



SECURITY: Fedora 35 Update: strongswan-5.9.5-2.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-b670788a8d
2022-02-04 01:19:29.204441
--------------------------------------------------------------------------------

Name : strongswan
Product : Fedora 35
Version : 5.9.5
Release : 2.fc35
URL :   http://www.strongswan.org/
Summary : An OpenSource IPsec-based VPN and TNC solution
Description :
The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key
exchange protocols in conjunction with the native NETKEY IPsec stack of the
Linux kernel.

--------------------------------------------------------------------------------
Update Information:

Fix for CVE-2021-45079
--------------------------------------------------------------------------------
ChangeLog:

* Tue Jan 25 2022 Paul Wouters - 5.9.5-2
- Use newly published/cleaned strongswan gpg key
* Mon Jan 24 2022 Paul Wouters - 5.9.5-1
- Resolves rhbz#2044361 strongswan-5.9.5 is available (CVE-2021-45079)
* Sat Jan 22 2022 Fedora Release Engineering - 5.9.4-5
- Rebuilt for   https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2042047 - CVE-2021-45079 strongswan: Incorrect Handling of Early EAP-Success Messages
  https://bugzilla.redhat.com/show_bug.cgi?id=2042047
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-b670788a8d' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________