cvrf2cusa/cvrf/2023/cvrf-openEuler-SA-2023-1581.xml
Jia Chao 0b34274085 git mv
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-25 09:57:37 +08:00

224 lines
17 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for libreswan is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2023-1581</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2023-09-02</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2023-09-02</InitialReleaseDate>
<CurrentReleaseDate>2023-09-02</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2023-09-02</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">libreswan security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for libreswan is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Libreswan is an implementation of IKEv1 and IKEv2 for IPsec. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services.
Security Fix(es):
An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload&apos;s protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.(CVE-2023-38710)
An issue was discovered in Libreswan before 4.12. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR receives an IDcr payload with ID_FQDN, a NULL pointer dereference causes a crash and restart of the pluto daemon. NOTE: the earliest affected version is 4.6.(CVE-2023-38711)
An issue was discovered in Libreswan 3.x and 4.x before 4.12. When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a NULL pointer dereference on the deleted state causes the pluto daemon to crash and restart.(CVE-2023-38712)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for libreswan is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">libreswan</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1581</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-38710</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-38711</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-38712</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-38710</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-38711</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-38712</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-20.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">openEuler-20.03-LTS-SP3</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">openEuler-22.03-LTS</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">openEuler-22.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">openEuler-22.03-LTS-SP2</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libreswan-4.12-1.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libreswan-debugsource-4.12-1.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libreswan-debuginfo-4.12-1.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-help-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libreswan-help-4.12-1.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libreswan-debugsource-4.12-1.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-help-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libreswan-help-4.12-1.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libreswan-4.12-1.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libreswan-debuginfo-4.12-1.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debuginfo-4.12-1.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debugsource-4.12-1.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-help-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-help-4.12-1.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-4.12-1.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-help-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libreswan-help-4.12-1.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libreswan-4.12-1.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libreswan-debuginfo-4.12-1.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libreswan-debugsource-4.12-1.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libreswan-debuginfo-4.12-1.oe2203sp2.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-help-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libreswan-help-4.12-1.oe2203sp2.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libreswan-debugsource-4.12-1.oe2203sp2.aarch64.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libreswan-4.12-1.oe2203sp2.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libreswan-4.12-1.oe1.src.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libreswan-4.12-1.oe1.src.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-4.12-1.oe2203.src.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libreswan-4.12-1.oe2203sp1.src.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libreswan-4.12-1.oe2203sp2.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libreswan-4.12-1.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libreswan-debuginfo-4.12-1.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libreswan-debugsource-4.12-1.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-help-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libreswan-help-4.12-1.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libreswan-debuginfo-4.12-1.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libreswan-4.12-1.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-help-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libreswan-help-4.12-1.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.12-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libreswan-debugsource-4.12-1.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-help-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-help-4.12-1.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debugsource-4.12-1.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-4.12-1.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libreswan-debuginfo-4.12-1.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-help-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libreswan-help-4.12-1.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libreswan-debuginfo-4.12-1.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libreswan-debugsource-4.12-1.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libreswan-4.12-1.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debuginfo-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libreswan-debuginfo-4.12-1.oe2203sp2.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-help-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libreswan-help-4.12-1.oe2203sp2.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-debugsource-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libreswan-debugsource-4.12-1.oe2203sp2.x86_64.rpm</FullProductName>
<FullProductName ProductID="libreswan-4.12-1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libreswan-4.12-1.oe2203sp2.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload s protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart.https://libreswan.org/security/CVE-2023-38710/CVE-2023-38710.txt</Note>
</Notes>
<ReleaseDate>2023-09-02</ReleaseDate>
<CVE>CVE-2023-38710</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
<ProductID>openEuler-22.03-LTS-SP2</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>6.5</BaseScore>
<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libreswan security update</Description>
<DATE>2023-09-02</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1581</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR, receives an IDcr payload with ID_FQDN, a null pointer dereference causes a crash and restart of the pluto daemon.https://libreswan.org/security/CVE-2023-38711/CVE-2023-38711.txt</Note>
</Notes>
<ReleaseDate>2023-09-02</ReleaseDate>
<CVE>CVE-2023-38711</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
<ProductID>openEuler-22.03-LTS-SP2</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>6.5</BaseScore>
<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libreswan security update</Description>
<DATE>2023-09-02</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1581</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="3" xml:lang="en">When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a null pointer dereference on the deleted state causes the pluto daemon to crash and restart.https://libreswan.org/security/CVE-2023-38712/CVE-2023-38712.txt</Note>
</Notes>
<ReleaseDate>2023-09-02</ReleaseDate>
<CVE>CVE-2023-38712</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
<ProductID>openEuler-22.03-LTS-SP2</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>6.5</BaseScore>
<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libreswan security update</Description>
<DATE>2023-09-02</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1581</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>