cvrf2cusa/cvrf/2023/cvrf-openEuler-SA-2023-1150.xml

110 lines
6.7 KiB
XML
Raw Normal View History

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for libreswan is now available for openEuler-22.03-LTS</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2023-1150</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2023-03-10</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2023-03-10</InitialReleaseDate>
<CurrentReleaseDate>2023-03-10</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2023-03-10</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">libreswan security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for libreswan is now available for openEuler-22.03-LTS.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Libreswan is an implementation of IKEv1 and IKEv2 for IPsec. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. Everything passing through the untrusted net is encrypted by the ipsec gateway machine and decrypted by the gateway at the other end of the tunnel. The resulting tunnel is a virtual private network or VPN. This package contains the daemons and userland tools for setting up Libreswan. Libreswan also supports IKEv2 (RFC7296) and Secure Labeling Libreswan is based on Openswan-2.6.38 which in turn is based on FreeS/WAN-2.04
Security Fix(es):
Libreswan 4.9 allows remote attackers to cause a denial of service (assert failure and daemon restart) via crafted TS payload with an incorrect selector length.(CVE-2023-23009)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for libreswan is now available for openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">libreswan</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1150</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-23009</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-23009</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-22.03-LTS" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">openEuler-22.03-LTS</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="libreswan-help-4.5-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-help-4.5-3.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.5-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debuginfo-4.5-3.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.5-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debugsource-4.5-3.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.5-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-4.5-3.oe2203.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="noarch">
<FullProductName ProductID="libreswan-debuginfo-4.5-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debuginfo-4.5-3.oe2203.sw_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.5-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-4.5-3.oe2203.sw_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-help-4.5-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-help-4.5-3.oe2203.sw_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.5-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debugsource-4.5-3.oe2203.sw_64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="libreswan-4.5-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-4.5-3.oe2203.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="libreswan-help-4.5-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-help-4.5-3.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.5-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-4.5-3.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.5-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debuginfo-4.5-3.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.5-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debugsource-4.5-3.oe2203.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Libreswan 4.9 allows remote attackers to cause a denial of service (assert failure and daemon restart) via crafted TS payload with an incorrect selector length.</Note>
</Notes>
<ReleaseDate>2023-03-10</ReleaseDate>
<CVE>CVE-2023-23009</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-22.03-LTS</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libreswan security update</Description>
<DATE>2023-03-10</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1150</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>