We are happy to announce the release of strongSwan 5.3.2, which fixes a vulnerability and two other issues.
Information Leak Vulnerability (CVE-2015-4171)
An information leak vulnerability was fixed that, in certain IKEv2 setups, allowed rogue servers with a valid certificate accepted by the client to trick it into disclosing user credentials (even plain passwords if the client accepts EAP-GTC). This was caused because constraints against the server's authentication were enforced too late. All versions since 4.3.0 are affected.
More information is provided in a separate blog entry.
Fixed two regressions in 5.3.x
- Manual reqid assignment via configuration was broken since 5.3.0 (#976).
- Sequential IV allocation was broken in 5.3.1 (#980).