An update for libreswan is now available for openEuler-22.03-LTS
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-1738
Final
1.0
1.0
2022-07-08
Initial
2022-07-08
2022-07-08
openEuler SA Tool V1.0
2022-07-08
libreswan security update
An update for libreswan is now available for openEuler-22.03-LTS.
Libreswan is an implementation of IKEv1 and IKEv2 for IPsec. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. Everything passing through the untrusted net is encrypted by the ipsec gateway machine and decrypted by the gateway at the other end of the tunnel. The resulting tunnel is a virtual private network or VPN.
Security Fix(es):
Libreswan 4.2 through 4.5 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6.(CVE-2022-23094)
An update for libreswan is now available for openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
libreswan
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1738
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-23094
https://nvd.nist.gov/vuln/detail/CVE-2022-23094
openEuler-22.03-LTS
libreswan-4.5-2.oe2203.aarch64.rpm
libreswan-debugsource-4.5-2.oe2203.aarch64.rpm
libreswan-help-4.5-2.oe2203.aarch64.rpm
libreswan-debuginfo-4.5-2.oe2203.aarch64.rpm
libreswan-4.5-2.oe2203.src.rpm
libreswan-debugsource-4.5-2.oe2203.x86_64.rpm
libreswan-4.5-2.oe2203.x86_64.rpm
libreswan-debuginfo-4.5-2.oe2203.x86_64.rpm
libreswan-help-4.5-2.oe2203.x86_64.rpm
Libreswan 4.2 through 4.5 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6.
2022-07-08
CVE-2022-23094
openEuler-22.03-LTS
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
libreswan security update
2022-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1738