openSUSE Security Update: Security update for strongswan ______________________________________________________________________________ Announcement ID: openSUSE-SU-2021:1399-1 Rating: important References: #1191367 #1191435 SLE-20151 Cross-References: CVE-2021-41990 CVE-2021-41991 CVSS scores: CVE-2021-41990 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2021-41991 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: openSUSE Leap 15.2 ______________________________________________________________________________ An update that fixes two vulnerabilities, contains one feature is now available. Description: This update for strongswan fixes the following issues: A feature was added: - Add auth_els plugin to support Marvell FC-SP encryption (jsc#SLE-20151) Security issues fixed: - CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435) - CVE-2021-41990: Fixed an integer Overflow in the gmp Plugin. (bsc#1191367) This update was imported from the SUSE:SLE-15-SP2:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-1399=1 Package List: - openSUSE Leap 15.2 (noarch): strongswan-doc-5.8.2-lp152.2.18.1 - openSUSE Leap 15.2 (x86_64): strongswan-5.8.2-lp152.2.18.1 strongswan-debuginfo-5.8.2-lp152.2.18.1 strongswan-debugsource-5.8.2-lp152.2.18.1 strongswan-hmac-5.8.2-lp152.2.18.1 strongswan-ipsec-5.8.2-lp152.2.18.1 strongswan-ipsec-debuginfo-5.8.2-lp152.2.18.1 strongswan-libs0-5.8.2-lp152.2.18.1 strongswan-libs0-debuginfo-5.8.2-lp152.2.18.1 strongswan-mysql-5.8.2-lp152.2.18.1 strongswan-mysql-debuginfo-5.8.2-lp152.2.18.1 strongswan-nm-5.8.2-lp152.2.18.1 strongswan-nm-debuginfo-5.8.2-lp152.2.18.1 strongswan-sqlite-5.8.2-lp152.2.18.1 strongswan-sqlite-debuginfo-5.8.2-lp152.2.18.1 References: https://www.suse.com/security/cve/CVE-2021-41990.html https://www.suse.com/security/cve/CVE-2021-41991.html https://bugzilla.suse.com/1191367 https://bugzilla.suse.com/1191435