Bug 1585966 (CVE-2018-10811) - CVE-2018-10811 strongswan: Missing initialization of a variable in IKEv2 key derivation allows denial of service
Summary: CVE-2018-10811 strongswan: Missing initialization of a variable in IKEv2 key ...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2018-10811
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1585968 1585969
Blocks:
TreeView+ depends on / blocked
 
Reported: 2018-06-05 08:30 UTC by Adam Mariš
Modified: 2021-02-17 00:11 UTC (History)
4 users (show)

Fixed In Version: strongswan 5.6.3
Clone Of:
Environment:
Last Closed: 2018-06-05 08:35:21 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2018-06-05 08:30:52 UTC
A denial-of-service vulnerability in the IKEv2 key derivation if the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF was discovered. All strongSwan versions since 5.0.1 may be affected.

Upstream patches:

https://download.strongswan.org/security/CVE-2018-10811/

External References:

https://www.strongswan.org/blog/2018/05/28/strongswan-vulnerability-(cve-2018-10811).html

Comment 1 Adam Mariš 2018-06-05 08:31:27 UTC
Created strongswan tracking bugs for this issue:

Affects: epel-all [bug 1585969]
Affects: fedora-all [bug 1585968]

Comment 2 Adam Mariš 2018-06-05 08:35:27 UTC
Statement:

This issue did not affect the versions of strongimcv as shipped with Red Hat Enterprise Linux 7 as they did not include support for IKE features.


Note You need to log in before you can comment on or make changes to this bug.