Debian: DSA-5368-1: libreswan security update | LinuxSecurity.com

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5368-1                   [email protected]
https://www.debian.org/security/                     Salvatore Bonaccorso
March 03, 2023                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libreswan
CVE ID         : CVE-2023-23009
Debian Bug     : 1031821

It was discovered that the libreswan IPsec implementation could be
forced into a crash/restart via malformed IKEv2 packets after peer
authentication, resulting in denial of service.

For the stable distribution (bullseye), this problem has been fixed in
version 4.3-1+deb11u3.

We recommend that you upgrade your libreswan packages.

For the detailed security status of libreswan please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/libreswan

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Debian: DSA-5368-1: libreswan security update

March 3, 2023
It was discovered that the libreswan IPsec implementation could be forced into a crash/restart via malformed IKEv2 packets after peer authentication, resulting in denial of service

Summary

For the stable distribution (bullseye), this problem has been fixed in
version 4.3-1+deb11u3.

We recommend that you upgrade your libreswan packages.

For the detailed security status of libreswan please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/libreswan

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Severity
It was discovered that the libreswan IPsec implementation could be
forced into a crash/restart via malformed IKEv2 packets after peer
authentication, resulting in denial of service.

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.