Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
0001-do-not-use-git-version.patch | do not use git version avoid using git version when building debian package |
Daniel Kahn Gillmor <dkg@fifthhorseman.net> | not-needed | 2015-03-21 | ||
0002-debian-pam.d-pluto.patch | debian-pam.d-pluto | Marc-Christian Petersen <m.c.p@gmx.de> | not-needed | 2016-03-09 | ||
CVE-2022-23094.patch | CVE-2022-23094: Malicious IKEv1 packet can cause libreswan to restart Release date: Wednesday, January 11, 2022 PGP key: 907E790F25C1E8E561CD73B585FF4B43B30FC6F9 ===================================================================== CVE-2022-23094: Malicious IKEv1 packet can cause libreswan to restart ===================================================================== This alert (and any updates) are available at the following URLs: https://libreswan.org/security/CVE-2022-23094/ The Libreswan Project was notified by github user "MyOzCam" of an issue with receiveing a malformed IKEv1 packet that crashed their server. A malformed packet that is being rejected triggers a logging action that causes a NULL pointer dereference leading to a crash of the pluto daemon. |
Paul Wouters <paul.wouters@aiven.io> | no | 2022-01-12 | ||
CVE-2023-23009-libreswan-4.2-4.3.patch | CVE-2023-23009-libreswan-4.2-4.3 | Paul Wouters <paul.wouters@aiven.io> | yes | 2023-03-03 | ||
0005-Resolve-CVE-2023-30570.patch | Resolve CVE-2023-30570 see https://libreswan.org/security/CVE-2023-30570/CVE-2023-30570.txt This patch was ported from https://libreswan.org/security/CVE-2023-30570/CVE-2023-30570-libreswan-4.x.patch |
Daniel Kahn Gillmor <dkg@fifthhorseman.net> | no | 2023-06-01 |