-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: libreswan security and bug fix update
Advisory ID:       RHSA-2023:3095-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:3095
Issue date:        2023-05-16
CVE Names:         CVE-2023-23009 
====================================================================
1. Summary:

An update for libreswan is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the
Internet Protocol Security and uses strong cryptography to provide both
authentication and encryption services. These services allow you to build
secure tunnels through untrusted networks such as virtual private network
(VPN).

Security Fix(es):

* libreswan: remote DoS via crafted TS payload with an incorrect selector
length (CVE-2023-23009)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* authby=rsasig fails in FIPS policy (BZ#2187647)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2173610 - CVE-2023-23009 libreswan: remote DoS via crafted TS payload with an incorrect selector length
2187647 - authby=rsasig fails in FIPS policy [rhel-8.8.0.z]

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
libreswan-4.9-2.el8_8.2.src.rpm

aarch64:
libreswan-4.9-2.el8_8.2.aarch64.rpm
libreswan-debuginfo-4.9-2.el8_8.2.aarch64.rpm
libreswan-debugsource-4.9-2.el8_8.2.aarch64.rpm

ppc64le:
libreswan-4.9-2.el8_8.2.ppc64le.rpm
libreswan-debuginfo-4.9-2.el8_8.2.ppc64le.rpm
libreswan-debugsource-4.9-2.el8_8.2.ppc64le.rpm

s390x:
libreswan-4.9-2.el8_8.2.s390x.rpm
libreswan-debuginfo-4.9-2.el8_8.2.s390x.rpm
libreswan-debugsource-4.9-2.el8_8.2.s390x.rpm

x86_64:
libreswan-4.9-2.el8_8.2.x86_64.rpm
libreswan-debuginfo-4.9-2.el8_8.2.x86_64.rpm
libreswan-debugsource-4.9-2.el8_8.2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2023-23009
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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Bqq0
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-3095:01 Moderate: libreswan

An update for libreswan is now available for Red Hat Enterprise Linux 8

Summary

Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN).
Security Fix(es):
* libreswan: remote DoS via crafted TS payload with an incorrect selector length (CVE-2023-23009)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* authby=rsasig fails in FIPS policy (BZ#2187647)



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2023-23009 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Enterprise Linux AppStream (v. 8):
Source: libreswan-4.9-2.el8_8.2.src.rpm
aarch64: libreswan-4.9-2.el8_8.2.aarch64.rpm libreswan-debuginfo-4.9-2.el8_8.2.aarch64.rpm libreswan-debugsource-4.9-2.el8_8.2.aarch64.rpm
ppc64le: libreswan-4.9-2.el8_8.2.ppc64le.rpm libreswan-debuginfo-4.9-2.el8_8.2.ppc64le.rpm libreswan-debugsource-4.9-2.el8_8.2.ppc64le.rpm
s390x: libreswan-4.9-2.el8_8.2.s390x.rpm libreswan-debuginfo-4.9-2.el8_8.2.s390x.rpm libreswan-debugsource-4.9-2.el8_8.2.s390x.rpm
x86_64: libreswan-4.9-2.el8_8.2.x86_64.rpm libreswan-debuginfo-4.9-2.el8_8.2.x86_64.rpm libreswan-debugsource-4.9-2.el8_8.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2023:3095-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3095
Issued Date: : 2023-05-16
CVE Names: CVE-2023-23009

Topic

An update for libreswan is now available for Red Hat Enterprise Linux 8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

2173610 - CVE-2023-23009 libreswan: remote DoS via crafted TS payload with an incorrect selector length

2187647 - authby=rsasig fails in FIPS policy [rhel-8.8.0.z]


Related News