Home / mailings [SECURITY] [DSA 6041-1] strongswan security update
Posted on 27 October 2025
Debian Security Advisory- -------------------------------------------------------------------------
Debian Security Advisory DSA-6041-1 security@debian.org
https://www.debian.org/security/ Yves-Alexis Perez
October 27, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : strongswan
CVE ID : CVE-2025-62291
Xu Biang discovered a buffer overflow bug in the eap-mschapv2 plugin of
strongSwan, an IKE/IPsec suite.
The eap-mschapv2 plugin doesn't correctly check the length of an
EAP-MSCHAPv2 Failure Request packet on the client, which can cause an
integer underflow that leads to a crash, and a heap-based buffer
overflow that's potentially exploitable for remote code execution.
For the oldstable distribution (bookworm), this problem has been fixed
in version 5.9.8-5+deb12u2.
For the stable distribution (trixie), this problem has been fixed in
version 6.0.1-6+deb13u2.
We recommend that you upgrade your strongswan packages.
For the detailed security status of strongswan please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/strongswan
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
