This bug was fixed in the package strongswan - 6.0.4-1ubuntu1

---------------
strongswan (6.0.4-1ubuntu1) resolute; urgency=medium

  * Merge with Debian unstable (LP: #2125990). Remaining changes:
    - d/control: strongswan-starter hard-depends on strongswan-charon,
      therefore bump the dependency from Recommends to Depends. At the same
      time avoid a circular dependency by dropping
      strongswan-charon->strongswan-starter from Depends to Recommends as the
      binaries can work without the services but not vice versa.
    - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
      + d/control: update libcharon-extra-plugins description.
      + d/libcharon-extra-plugins.install: install .so and conf files.
      + d/rules: add plugins to the configuration arguments.
    - d/t/{control,host-to-host,utils}: new host-to-host test (LP #1999525)
    - d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl (LP #1999935)
  * Dropped changes:
    - Cherry-pick upstream commits to fix FTBFS with GCC-15 C23.
      [applied in 6.0.2]
      + debian/patches/gcc15-compat/*
    - d/t/host-to-host: disable DNSSEC via negative trust anchor for lxd domain
      (LP #2119652)
      [not needed anymore, as DNSSEC allow-downgrade was dropped by default]
    - SECURITY UPDATE: Buffer Overflow When Handling EAP-MSCHAPv2 Failure.
      Requests
      [applied in 6.0.3]
      + debian/patches/CVE-2025-62291.patch: fix length check for Failure
        Request packets on the client in
        src/libcharon/plugins/eap_mschapv2/eap_mschapv2.c.

strongswan (6.0.4-1) unstable; urgency=medium

  * New upstream version 6.0.4 (Closes: #1122971)
    - Fix CVE-2025-9615 in the network manager plugin (potential usage of
    other users credentials).

strongswan (6.0.3-1) unstable; urgency=medium

  * New upstream version 6.0.3
    - Fix for buffer overflow in EAP-MSCHAPv2 (CVE-2025-62291)

strongswan (6.0.2-1) unstable; urgency=medium

  * New upstream version 6.0.2
    - Fix support with OpenSSL 3.5.1+ (Closes: #1109942)
  * install iptfs configuration in libstrongswan
  * d/copyright updated with decopy

 -- Lukas Märdian <[email protected]>  Tue, 20 Jan 2026 09:58:16 +0100

** Changed in: strongswan (Ubuntu)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.org/CVERecord?id=CVE-2025-62291

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2125990

Title:
  Merge strongswan from Debian Unstable for r-series

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/strongswan/+bug/2125990/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to