[Git][security-tracker-team/security-tracker][master] add note + no-dsa for IKEv1 PSK brute-force
Yves-Alexis Perez
corsac at debian.org
Mon Aug 20 11:16:42 BST 2018
Yves-Alexis Perez pushed to branch master at Debian Security Tracker / security-tracker
Commits:
1c6a6ebc by Yves-Alexis Perez at 2018-08-20T10:16:21Z
add note + no-dsa for IKEv1 PSK brute-force
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -27303,8 +27303,23 @@ CVE-2018-5390 (Linux kernel versions 4.9+ can be forced to make very expensive c
- linux 4.17.14-1 (bug #905751)
[jessie] - linux <not-affected> (Vulnerable code introduced later)
NOTE: https://www.kb.cert.org/vuls/id/962459
-CVE-2018-5389
- RESERVED
+CVE-2018-5389 [low-entropy passphrase in IKEv1 can be brute-forced]
+ RESERVED
+ NOTE: https://www.usenix.org/conference/usenixsecurity18/presentation/felsch
+ NOTE: https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdf
+ NOTE: https://www.usenix.org/sites/default/files/conference/protected-files/security18_slides_felsch.pdf
+ - strongswan <unfixed> (unimportant)
+ [stretch] - strongswan <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
+ [jessie] - strongswan <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
+ - libreswan <unfixed> (unimportant)
+ [stretch] - libreswan <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
+ [jessie] - libreswan <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
+ - ipsec-tools <unfixed> (unimportant)
+ [stretch] - ipsec-tools <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
+ [jessie] - ipsec-tools <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
+ - isakmpd <unfixed> (unimportant)
+ [stretch] - isakmpd <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
+ [jessie] - isakmpd <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
CVE-2018-5388 (In stroke_socket.c in strongSwan before 5.6.3, a missing packet length ...)
{DSA-4229-1}
- strongswan 5.6.3-1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/1c6a6ebc28b2408a7061e0bd106c3a790a5be293
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/1c6a6ebc28b2408a7061e0bd106c3a790a5be293
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20180820/b5ea5660/attachment.html>
More information about the debian-security-tracker-commits
mailing list