Debian Patches

Status for libreswan/4.3-1+deb11u3

Patch Description Author Forwarded Bugs Origin Last update
0001-do-not-use-git-version.patch do not use git version

avoid using git version when building debian package
Daniel Kahn Gillmor <dkg@fifthhorseman.net> not-needed 2015-03-21
0002-debian-pam.d-pluto.patch debian-pam.d-pluto Marc-Christian Petersen <m.c.p@gmx.de> not-needed 2016-03-09
CVE-2022-23094.patch CVE-2022-23094: Malicious IKEv1 packet can cause libreswan to restart

Release date: Wednesday, January 11, 2022
PGP key: 907E790F25C1E8E561CD73B585FF4B43B30FC6F9

=====================================================================
CVE-2022-23094: Malicious IKEv1 packet can cause libreswan to restart
=====================================================================

This alert (and any updates) are available at the following URLs:
https://libreswan.org/security/CVE-2022-23094/

The Libreswan Project was notified by github user "MyOzCam" of an
issue with receiveing a malformed IKEv1 packet that crashed their
server. A malformed packet that is being rejected triggers a logging
action that causes a NULL pointer dereference leading to a crash of
the pluto daemon.
Paul Wouters <paul.wouters@aiven.io> no 2022-01-12
CVE-2023-23009-libreswan-4.2-4.3.patch CVE-2023-23009-libreswan-4.2-4.3 Paul Wouters <paul.wouters@aiven.io> yes 2023-03-03

All known versions for source package 'libreswan'

Links