The manufacturer Canonical has not yet set up its devicebase profile. Content such as updates, compatibilities and support may only be maintained with a delay.
Update

USN-7841-1: strongSwan vulnerability

USN-7841-1: strongSwan vulnerability

Publication date: 27 October 2025
Overview: strongSwan client could be made to crash or run programs if it received specially crafted network traffic.

Packages
strongswan - IPsec VPN solution

Details
Xu Biang discovered that the strongSwan client incorrectly handled
EAP-MSCHAPv2 failure requests. If a user or automated system were tricked
into connecting to a malicious server, a remote attacker could use this
issue to cause strongSwan to crash, resulting in a denial of service, or
possibly execute arbitrary code.

Update instructions
In general, a standard system update will make all the necessary changes.
The problem can be corrected by updating your system to the following package versions:

25.10 questing

  • libstrongswan – 6.0.1-6ubuntu4.1
  • strongswan – 6.0.1-6ubuntu4.1
    25.04 plucky
  • libstrongswan – 5.9.13-2ubuntu4.25.04.1
  • strongswan – 5.9.13-2ubuntu4.25.04.1
    24.04 LTS noble
  • libstrongswan – 5.9.13-2ubuntu4.24.04.1
  • strongswan – 5.9.13-2ubuntu4.24.04.1
    22.04 LTS jammy
  • libstrongswan – 5.9.5-2ubuntu2.4
  • strongswan – 5.9.5-2ubuntu2.4
Version: 24.04 LTS Link
Receive Important Update Messages Stay tuned for upcoming Canonical Ubuntu Desktop updates

More from the Operating Systems section

Was the content helpful to you?

Advertisement Advertise here?
Udemy IT certification ad