[Git][security-tracker-team/security-tracker][master] only use unimportant, no need for no-dsa

Yves-Alexis Perez corsac at debian.org
Mon Aug 20 12:08:51 BST 2018


Yves-Alexis Perez pushed to branch master at Debian Security Tracker / security-tracker


Commits:
b49b79f0 by Yves-Alexis Perez at 2018-08-20T11:08:27Z
only use unimportant, no need for no-dsa

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -27308,18 +27308,11 @@ CVE-2018-5389 [low-entropy passphrase in IKEv1 can be brute-forced]
 	NOTE: https://www.usenix.org/conference/usenixsecurity18/presentation/felsch
 	NOTE: https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdf
 	NOTE: https://www.usenix.org/sites/default/files/conference/protected-files/security18_slides_felsch.pdf
+	NOTE: vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
 	- strongswan <unfixed> (unimportant)
-	[stretch] - strongswan <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
-	[jessie] - strongswan <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
 	- libreswan <unfixed> (unimportant)
-	[stretch] - libreswan <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
-	[jessie] - libreswan <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
 	- ipsec-tools <unfixed> (unimportant)
-	[stretch] - ipsec-tools <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
-	[jessie] - ipsec-tools <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
 	- isakmpd <unfixed> (unimportant)
-	[stretch] - isakmpd <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
-	[jessie] - isakmpd <no-dsa> (vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
 CVE-2018-5388 (In stroke_socket.c in strongSwan before 5.6.3, a missing packet length ...)
 	{DSA-4229-1}
 	- strongswan 5.6.3-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/b49b79f0704d5e6c8a83dbf79bf18deb9fc44669

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/b49b79f0704d5e6c8a83dbf79bf18deb9fc44669
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20180820/561f1af6/attachment.html>


More information about the debian-security-tracker-commits mailing list