An update for libreswan is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1581
Final
1.0
1.0
2023-09-02
Initial
2023-09-02
2023-09-02
openEuler SA Tool V1.0
2023-09-02
libreswan security update
An update for libreswan is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2.
Libreswan is an implementation of IKEv1 and IKEv2 for IPsec. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services.
Security Fix(es):
An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.(CVE-2023-38710)
An issue was discovered in Libreswan before 4.12. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR receives an IDcr payload with ID_FQDN, a NULL pointer dereference causes a crash and restart of the pluto daemon. NOTE: the earliest affected version is 4.6.(CVE-2023-38711)
An issue was discovered in Libreswan 3.x and 4.x before 4.12. When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a NULL pointer dereference on the deleted state causes the pluto daemon to crash and restart.(CVE-2023-38712)
An update for libreswan is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
libreswan
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1581
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-38710
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-38711
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-38712
https://nvd.nist.gov/vuln/detail/CVE-2023-38710
https://nvd.nist.gov/vuln/detail/CVE-2023-38711
https://nvd.nist.gov/vuln/detail/CVE-2023-38712
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP2
libreswan-4.12-1.oe1.aarch64.rpm
libreswan-debugsource-4.12-1.oe1.aarch64.rpm
libreswan-debuginfo-4.12-1.oe1.aarch64.rpm
libreswan-help-4.12-1.oe1.aarch64.rpm
libreswan-debugsource-4.12-1.oe1.aarch64.rpm
libreswan-help-4.12-1.oe1.aarch64.rpm
libreswan-4.12-1.oe1.aarch64.rpm
libreswan-debuginfo-4.12-1.oe1.aarch64.rpm
libreswan-debuginfo-4.12-1.oe2203.aarch64.rpm
libreswan-debugsource-4.12-1.oe2203.aarch64.rpm
libreswan-help-4.12-1.oe2203.aarch64.rpm
libreswan-4.12-1.oe2203.aarch64.rpm
libreswan-help-4.12-1.oe2203sp1.aarch64.rpm
libreswan-4.12-1.oe2203sp1.aarch64.rpm
libreswan-debuginfo-4.12-1.oe2203sp1.aarch64.rpm
libreswan-debugsource-4.12-1.oe2203sp1.aarch64.rpm
libreswan-debuginfo-4.12-1.oe2203sp2.aarch64.rpm
libreswan-help-4.12-1.oe2203sp2.aarch64.rpm
libreswan-debugsource-4.12-1.oe2203sp2.aarch64.rpm
libreswan-4.12-1.oe2203sp2.aarch64.rpm
libreswan-4.12-1.oe1.src.rpm
libreswan-4.12-1.oe1.src.rpm
libreswan-4.12-1.oe2203.src.rpm
libreswan-4.12-1.oe2203sp1.src.rpm
libreswan-4.12-1.oe2203sp2.src.rpm
libreswan-4.12-1.oe1.x86_64.rpm
libreswan-debuginfo-4.12-1.oe1.x86_64.rpm
libreswan-debugsource-4.12-1.oe1.x86_64.rpm
libreswan-help-4.12-1.oe1.x86_64.rpm
libreswan-debuginfo-4.12-1.oe1.x86_64.rpm
libreswan-4.12-1.oe1.x86_64.rpm
libreswan-help-4.12-1.oe1.x86_64.rpm
libreswan-debugsource-4.12-1.oe1.x86_64.rpm
libreswan-help-4.12-1.oe2203.x86_64.rpm
libreswan-debugsource-4.12-1.oe2203.x86_64.rpm
libreswan-4.12-1.oe2203.x86_64.rpm
libreswan-debuginfo-4.12-1.oe2203.x86_64.rpm
libreswan-help-4.12-1.oe2203sp1.x86_64.rpm
libreswan-debuginfo-4.12-1.oe2203sp1.x86_64.rpm
libreswan-debugsource-4.12-1.oe2203sp1.x86_64.rpm
libreswan-4.12-1.oe2203sp1.x86_64.rpm
libreswan-debuginfo-4.12-1.oe2203sp2.x86_64.rpm
libreswan-help-4.12-1.oe2203sp2.x86_64.rpm
libreswan-debugsource-4.12-1.oe2203sp2.x86_64.rpm
libreswan-4.12-1.oe2203sp2.x86_64.rpm
When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload s protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart.https://libreswan.org/security/CVE-2023-38710/CVE-2023-38710.txt
2023-09-02
CVE-2023-38710
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP2
Medium
6.5
AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
libreswan security update
2023-09-02
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1581
When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR, receives an IDcr payload with ID_FQDN, a null pointer dereference causes a crash and restart of the pluto daemon.https://libreswan.org/security/CVE-2023-38711/CVE-2023-38711.txt
2023-09-02
CVE-2023-38711
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP2
Medium
6.5
AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
libreswan security update
2023-09-02
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1581
When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a null pointer dereference on the deleted state causes the pluto daemon to crash and restart.https://libreswan.org/security/CVE-2023-38712/CVE-2023-38712.txt
2023-09-02
CVE-2023-38712
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP2
Medium
6.5
AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
libreswan security update
2023-09-02
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1581