Seven Vulnerabilities Fixed
Thanks to improvements in AI-assisted security analysis, the following seven vulnerabilities were found and fixed. Please refer to the individual advisories for further details.
- CVE-2026-35328 - A vulnerability in
libtlsrelated to the processing of the supported_versions extension in TLS was fixed that can result in an infinite loop. All strongSwan versions since 5.9.2 are affected. - CVE-2026-35329 - A vulnerability in
libstrongswanand thepkcs7plugin related to the processing of encrypted PKCS#7 containers was fixed that can result in a crash. All strongSwan versions since 5.0.2 are affected. - CVE-2026-35330 - A vulnerability in
libsimakarelated to the processing of certain EAP-SIM/AKA attributes was fixed that can result in an infinite loop or a heap-based buffer overflow and potentially remote code execution. All strongSwan versions since 4.3.6 are affected. - CVE-2026-35331 - A vulnerability in the
constraintsplugin related to the processing of X.509 name constraints was fixed that can allow authentication with certificates that violate the constraints. All strongSwan versions since 4.5.1 are affected. - CVE-2026-35332 - A vulnerability in
libtlsrelated to the processing of ECDH public values in TLS < 1.3 was fixed that can result in a crash. All strongSwan versions since 4.5.0 are affected. - CVE-2026-35333 - A vulnerability in
libradiusrelated to the processing of RADIUS attributes was fixed that can result in an infinite loop or an out-of-bounds read that may cause a crash. All strongSwan versions since 4.2.14 are affected. - CVE-2026-35334 - A vulnerability in the
gmpplugin related to RSA decryption was fixed that can result in a crash. All strongSwan versions since 4.3.2 are affected.