A denial-of-service vulnerability in the IKEv2 key derivation if the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF was discovered. All strongSwan versions since 5.0.1 may be affected. Upstream patches: https://download.strongswan.org/security/CVE-2018-10811/ External References: https://www.strongswan.org/blog/2018/05/28/strongswan-vulnerability-(cve-2018-10811).html
Created strongswan tracking bugs for this issue: Affects: epel-all [bug 1585969] Affects: fedora-all [bug 1585968]
Statement: This issue did not affect the versions of strongimcv as shipped with Red Hat Enterprise Linux 7 as they did not include support for IKE features.