Update

USN-7841-1: strongSwan vulnerability

USN-7841-1: strongSwan vulnerability

Publication date: 27 October 2025
Overview: strongSwan client could be made to crash or run programs if it received specially crafted network traffic.

Packages
strongswan - IPsec VPN solution

Details
Xu Biang discovered that the strongSwan client incorrectly handled
EAP-MSCHAPv2 failure requests. If a user or automated system were tricked
into connecting to a malicious server, a remote attacker could use this
issue to cause strongSwan to crash, resulting in a denial of service, or
possibly execute arbitrary code.

Update instructions
In general, a standard system update will make all the necessary changes.
The problem can be corrected by updating your system to the following package versions:

25.10 questing

  • libstrongswan – 6.0.1-6ubuntu4.1
  • strongswan – 6.0.1-6ubuntu4.1
    25.04 plucky
  • libstrongswan – 5.9.13-2ubuntu4.25.04.1
  • strongswan – 5.9.13-2ubuntu4.25.04.1
    24.04 LTS noble
  • libstrongswan – 5.9.13-2ubuntu4.24.04.1
  • strongswan – 5.9.13-2ubuntu4.24.04.1
    22.04 LTS jammy
  • libstrongswan – 5.9.5-2ubuntu2.4
  • strongswan – 5.9.5-2ubuntu2.4
The manufacturer Canonical has not yet set up its devicebase profile. Content such as updates, compatibilities and support may only be maintained with a delay.
Receive Important Update Messages Stay tuned for upcoming Canonical updates

Was the content helpful to you?

Advertisement Advertise here?
Udemy IT certification ad