strongSwan - Design by Margo Galas <galas (at) solnet (dot) ch>

Main Sponsors

secunet

secunet

revosec

Hochschule für Technik Rapperswil

strongSwan 5.3.2 Released

We are happy to announce the release of strongSwan 5.3.2, which fixes a vulnerability and two other issues.


Information Leak Vulnerability (CVE-2015-4171)

An information leak vulnerability was fixed that, in certain IKEv2 setups, allowed rogue servers with a valid certificate accepted by the client to trick it into disclosing user credentials (even plain passwords if the client accepts EAP-GTC). This was caused because constraints against the server's authentication were enforced too late. All versions since 4.3.0 are affected.

More information is provided in a separate blog entry.

Fixed two regressions in 5.3.x

  • Manual reqid assignment via configuration was broken since 5.3.0 (#976).
  • Sequential IV allocation was broken in 5.3.1 (#980).

Download it from here - a more extensive changelog can be found on our wiki.