csaf2cusa/cvrfs/2022/cvrf-openEuler-SA-2022-1738.xml
Jia Chao 0b84f3c661 增加测试用的配置和目录
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-02 15:51:55 +08:00

104 lines
6.0 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for libreswan is now available for openEuler-22.03-LTS</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2022-1738</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2022-07-08</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2022-07-08</InitialReleaseDate>
<CurrentReleaseDate>2022-07-08</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2022-07-08</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">libreswan security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for libreswan is now available for openEuler-22.03-LTS.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Libreswan is an implementation of IKEv1 and IKEv2 for IPsec. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. Everything passing through the untrusted net is encrypted by the ipsec gateway machine and decrypted by the gateway at the other end of the tunnel. The resulting tunnel is a virtual private network or VPN.
Security Fix(es):
Libreswan 4.2 through 4.5 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6.(CVE-2022-23094)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for libreswan is now available for openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">libreswan</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1738</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-23094</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-23094</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-22.03-LTS" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">openEuler-22.03-LTS</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="libreswan-4.5-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-4.5-2.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.5-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debugsource-4.5-2.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-help-4.5-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-help-4.5-2.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.5-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debuginfo-4.5-2.oe2203.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="libreswan-4.5-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-4.5-2.oe2203.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="libreswan-debugsource-4.5-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debugsource-4.5-2.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.5-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-4.5-2.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.5-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debuginfo-4.5-2.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-help-4.5-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-help-4.5-2.oe2203.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Libreswan 4.2 through 4.5 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6.</Note>
</Notes>
<ReleaseDate>2022-07-08</ReleaseDate>
<CVE>CVE-2022-23094</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-22.03-LTS</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libreswan security update</Description>
<DATE>2022-07-08</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1738</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>