Skip to content
Commits on Source (2)
......@@ -27305,14 +27305,14 @@ CVE-2018-5390 (Linux kernel versions 4.9+ can be forced to make very expensive c
NOTE: https://www.kb.cert.org/vuls/id/962459
CVE-2018-5389 [low-entropy passphrase in IKEv1 can be brute-forced]
RESERVED
NOTE: https://www.usenix.org/conference/usenixsecurity18/presentation/felsch
NOTE: https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdf
NOTE: https://www.usenix.org/sites/default/files/conference/protected-files/security18_slides_felsch.pdf
NOTE: vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
- strongswan <unfixed> (unimportant)
- libreswan <unfixed> (unimportant)
- ipsec-tools <unfixed> (unimportant)
- isakmpd <unfixed> (unimportant)
NOTE: https://www.usenix.org/conference/usenixsecurity18/presentation/felsch
NOTE: https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdf
NOTE: https://www.usenix.org/sites/default/files/conference/protected-files/security18_slides_felsch.pdf
NOTE: vulnerability in IKEv1 protocol, not fixable in implementation; use strong passphrase or public-ley cryptography)
CVE-2018-5388 (In stroke_socket.c in strongSwan before 5.6.3, a missing packet length ...)
{DSA-4229-1}
- strongswan 5.6.3-1
[20 Aug 2018] DSA-4279-1 linux - security update
{CVE-2018-3620 CVE-2018-3646}
[stretch] - linux 4.9.110-3+deb9u3
[19 Aug 2018] DSA-4278-1 jetty9 - security update
{CVE-2017-7656 CVE-2017-7657 CVE-2017-7658}
[stretch] - jetty9 9.2.21-1+deb9u1
......
......@@ -40,7 +40,7 @@ libidn
--
libspring-java
--
linux (benh, carnil)
linux
Wait until more issues have piled up
--
mariadb-10.1/stable
......