View | Details | Raw Unified | Return to bug 220874 | Differences between
and this patch

Collapse All | Expand All

(-)security/vuxml/vuln.xml (-31 / +10 lines)
Lines 195-201 Notes: Link Here
195
  </vuln>
195
  </vuln>
196
196
197
  <vuln vid="e6ccaf8a-6c63-11e7-9b01-2047478f2f70">
197
  <vuln vid="e6ccaf8a-6c63-11e7-9b01-2047478f2f70">
198
    <topic>strongswan -- Insufficient Input Validation in gmp Plugin</topic>
198
    <topic>strongswan -- multiple vulnerabilities</topic>
199
    <affects>
199
    <affects>
200
      <package>
200
      <package>
201
	<name>strongswan</name>
201
	<name>strongswan</name>
Lines 205-246 Notes: Link Here
205
    <description>
205
    <description>
206
      <body xmlns="http://www.w3.org/1999/xhtml">
206
      <body xmlns="http://www.w3.org/1999/xhtml">
207
	<p>strongSwan security team reports:</p>
207
	<p>strongSwan security team reports:</p>
208
	<blockquote cite="https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9022).html">
208
	<blockquote cite="https://www.strongswan.org/blog/2017/05/30/strongswan-5.5.3-released.html">
209
	  <p>RSA public keys passed to the gmp plugin aren't validated sufficiently
209
	  <ul>
210
	     before attempting signature verification, so that invalid input might
210
	    <li>RSA public keys passed to the gmp plugin aren't validated sufficiently
211
	     lead to a floating point exception.</p>
211
		  before attempting signature verification, so that invalid input might
212
	      lead to a floating point exception. [CVE-2017-9022]</li>
213
	    <li>ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when
214
	      parsing X.509 certificates with extensions that use such types. This
215
	      could lead to infinite looping of the thread parsing a specifically crafted certificate.</li>
216
	  </ul>
212
	</blockquote>
217
	</blockquote>
213
      </body>
218
      </body>
214
    </description>
219
    </description>
215
    <references>
220
    <references>
216
      <url>https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9022).html</url>
221
      <url>https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9022).html</url>
217
      <cvename>CVE-2017-9022</cvename>
222
      <cvename>CVE-2017-9022</cvename>
218
    </references>
219
    <dates>
220
      <discovery>2017-05-30</discovery>
221
      <entry>2017-07-19</entry>
222
    </dates>
223
  </vuln>
224
225
  <vuln vid="c7e8e955-6c61-11e7-9b01-2047478f2f70">
226
    <topic>strongswan -- Denial-of-service vulnerability in the x509 plugin</topic>
227
    <affects>
228
      <package>
229
	<name>strongswan</name>
230
	<range><le>5.5.3</le></range>
231
      </package>
232
    </affects>
233
    <description>
234
      <body xmlns="http://www.w3.org/1999/xhtml">
235
	<p>strongSwan security team reports:</p>
236
	<blockquote cite="https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9023).html">
237
	  <p>ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when
238
	     parsing X.509 certificates with extensions that use such types. This
239
	     could lead to infinite looping of the thread parsing a specifically crafted certificate.</p>
240
	</blockquote>
241
      </body>
242
    </description>
243
    <references>
244
      <url>https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9023).html</url>
223
      <url>https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9023).html</url>
245
      <cvename>CVE-2017-9023</cvename>
224
      <cvename>CVE-2017-9023</cvename>
246
    </references>
225
    </references>

Return to bug 220874