[strongSwan-dev] About Strongswan vuln CVE-2021-45079

Tobias Brunner tobias at strongswan.org
Tue Jan 25 16:37:03 CET 2022


Hi Totti,

> The issue is only at Strongswan client 
> side, right? Meaning that running server 5.9.4 is still safe?

That's correct.  Only the EAP client implementation is affected.

The patch does update the server part of the EAP implementation, 
however, that's only because it adds NOT_SUPPORTED as valid return value 
for eap_method_t::get_msk(), which is used on both client and server.

Regards,
Tobias


More information about the Dev mailing list