An update for libreswan is now available for openEuler-22.03-LTS Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-1738 Final 1.0 1.0 2022-07-08 Initial 2022-07-08 2022-07-08 openEuler SA Tool V1.0 2022-07-08 libreswan security update An update for libreswan is now available for openEuler-22.03-LTS. Libreswan is an implementation of IKEv1 and IKEv2 for IPsec. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. Everything passing through the untrusted net is encrypted by the ipsec gateway machine and decrypted by the gateway at the other end of the tunnel. The resulting tunnel is a virtual private network or VPN. Security Fix(es): Libreswan 4.2 through 4.5 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6.(CVE-2022-23094) An update for libreswan is now available for openEuler-22.03-LTS. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High libreswan https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1738 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-23094 https://nvd.nist.gov/vuln/detail/CVE-2022-23094 openEuler-22.03-LTS libreswan-4.5-2.oe2203.aarch64.rpm libreswan-debugsource-4.5-2.oe2203.aarch64.rpm libreswan-help-4.5-2.oe2203.aarch64.rpm libreswan-debuginfo-4.5-2.oe2203.aarch64.rpm libreswan-4.5-2.oe2203.src.rpm libreswan-debugsource-4.5-2.oe2203.x86_64.rpm libreswan-4.5-2.oe2203.x86_64.rpm libreswan-debuginfo-4.5-2.oe2203.x86_64.rpm libreswan-help-4.5-2.oe2203.x86_64.rpm Libreswan 4.2 through 4.5 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6. 2022-07-08 CVE-2022-23094 openEuler-22.03-LTS High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H libreswan security update 2022-07-08 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1738