Mageia 2023-0089: libreswan security update
Summary
A change in the libreswan 4.2 Traffic Selector parsing code introduced a
missing check that would reject palformed Traffic Selector payloads. As
such, in such case the code stumbles on to hit a double free, leading to a
crash and restart of the pluto daemon. No remote code execution.
(CVE-2023-23009)
References
- https://bugs.mageia.org/show_bug.cgi?id=31636
- https://libreswan.org/security/CVE-2023-23009/CVE-2023-23009.txt
- https://security-tracker.debian.org/tracker/CVE-2023-23009
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23009
Resolution
MGASA-2023-0089 - Updated libreswan packages fix security vulnerability
SRPMS
- 8/core/libreswan-4.6-4.1.mga8