An update for libreswan is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2023-1581 Final 1.0 1.0 2023-09-02 Initial 2023-09-02 2023-09-02 openEuler SA Tool V1.0 2023-09-02 libreswan security update An update for libreswan is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2. Libreswan is an implementation of IKEv1 and IKEv2 for IPsec. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. Security Fix(es): An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.(CVE-2023-38710) An issue was discovered in Libreswan before 4.12. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR receives an IDcr payload with ID_FQDN, a NULL pointer dereference causes a crash and restart of the pluto daemon. NOTE: the earliest affected version is 4.6.(CVE-2023-38711) An issue was discovered in Libreswan 3.x and 4.x before 4.12. When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a NULL pointer dereference on the deleted state causes the pluto daemon to crash and restart.(CVE-2023-38712) An update for libreswan is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium libreswan https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1581 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-38710 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-38711 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-38712 https://nvd.nist.gov/vuln/detail/CVE-2023-38710 https://nvd.nist.gov/vuln/detail/CVE-2023-38711 https://nvd.nist.gov/vuln/detail/CVE-2023-38712 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 libreswan-4.12-1.oe1.aarch64.rpm libreswan-debugsource-4.12-1.oe1.aarch64.rpm libreswan-debuginfo-4.12-1.oe1.aarch64.rpm libreswan-help-4.12-1.oe1.aarch64.rpm libreswan-debugsource-4.12-1.oe1.aarch64.rpm libreswan-help-4.12-1.oe1.aarch64.rpm libreswan-4.12-1.oe1.aarch64.rpm libreswan-debuginfo-4.12-1.oe1.aarch64.rpm libreswan-debuginfo-4.12-1.oe2203.aarch64.rpm libreswan-debugsource-4.12-1.oe2203.aarch64.rpm libreswan-help-4.12-1.oe2203.aarch64.rpm libreswan-4.12-1.oe2203.aarch64.rpm libreswan-help-4.12-1.oe2203sp1.aarch64.rpm libreswan-4.12-1.oe2203sp1.aarch64.rpm libreswan-debuginfo-4.12-1.oe2203sp1.aarch64.rpm libreswan-debugsource-4.12-1.oe2203sp1.aarch64.rpm libreswan-debuginfo-4.12-1.oe2203sp2.aarch64.rpm libreswan-help-4.12-1.oe2203sp2.aarch64.rpm libreswan-debugsource-4.12-1.oe2203sp2.aarch64.rpm libreswan-4.12-1.oe2203sp2.aarch64.rpm libreswan-4.12-1.oe1.src.rpm libreswan-4.12-1.oe1.src.rpm libreswan-4.12-1.oe2203.src.rpm libreswan-4.12-1.oe2203sp1.src.rpm libreswan-4.12-1.oe2203sp2.src.rpm libreswan-4.12-1.oe1.x86_64.rpm libreswan-debuginfo-4.12-1.oe1.x86_64.rpm libreswan-debugsource-4.12-1.oe1.x86_64.rpm libreswan-help-4.12-1.oe1.x86_64.rpm libreswan-debuginfo-4.12-1.oe1.x86_64.rpm libreswan-4.12-1.oe1.x86_64.rpm libreswan-help-4.12-1.oe1.x86_64.rpm libreswan-debugsource-4.12-1.oe1.x86_64.rpm libreswan-help-4.12-1.oe2203.x86_64.rpm libreswan-debugsource-4.12-1.oe2203.x86_64.rpm libreswan-4.12-1.oe2203.x86_64.rpm libreswan-debuginfo-4.12-1.oe2203.x86_64.rpm libreswan-help-4.12-1.oe2203sp1.x86_64.rpm libreswan-debuginfo-4.12-1.oe2203sp1.x86_64.rpm libreswan-debugsource-4.12-1.oe2203sp1.x86_64.rpm libreswan-4.12-1.oe2203sp1.x86_64.rpm libreswan-debuginfo-4.12-1.oe2203sp2.x86_64.rpm libreswan-help-4.12-1.oe2203sp2.x86_64.rpm libreswan-debugsource-4.12-1.oe2203sp2.x86_64.rpm libreswan-4.12-1.oe2203sp2.x86_64.rpm When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload s protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart.https://libreswan.org/security/CVE-2023-38710/CVE-2023-38710.txt 2023-09-02 CVE-2023-38710 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 Medium 6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H libreswan security update 2023-09-02 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1581 When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR, receives an IDcr payload with ID_FQDN, a null pointer dereference causes a crash and restart of the pluto daemon.https://libreswan.org/security/CVE-2023-38711/CVE-2023-38711.txt 2023-09-02 CVE-2023-38711 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 Medium 6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H libreswan security update 2023-09-02 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1581 When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a null pointer dereference on the deleted state causes the pluto daemon to crash and restart.https://libreswan.org/security/CVE-2023-38712/CVE-2023-38712.txt 2023-09-02 CVE-2023-38712 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 Medium 6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H libreswan security update 2023-09-02 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1581