ELSA-2024-2033

ELSA-2024-2033 - libreswan security and bug fix update

Type:SECURITY
Impact:MODERATE
Release Date:2024-04-24

Description


[4.12-1.0.1.1]
- Add libreswan-oracle.patch to detect Oracle Linux distro

[4.12-1.1]
- Fix CVE-2024-2357 (RHEL-29734)
- x509: unpack IPv6 general names based on length (RHEL-32719)

[4.12-1]
- Update to 4.12 to fix CVE-2023-38710, CVE-2023-38711, CVE-2023-38712
- Resolves: rhbz#2215956

[4.9-5]
- Just bumping up the version to include bugs for CVE-2023-2295. There is no
code fix for it. Fix for it is including the code fix for CVE-2023-30570.
- Fix CVE-2023-2295 Regression of CVE-2023-30570 fixes in the
Red Hat Enterprise Linux
- Resolves: rhbz#2189777, rhbz#2190148

[4.9-4]
- Just bumping up the version as an incorrect 9.3 build was created.
- Related: rhbz#2187171

[4.9-3]
- Fix CVE-2023-30570:Malicious IKEv1 Aggressive Mode packets can crash
libreswan
- Resolves: rhbz#2187171

[4.9-2]
- Fix CVE-2023-23009: remote DoS via crafted TS payload with an
incorrect selector length (rhbz#2173674)

[4.9-1]
- Update to 4.9. Resolves: rhbz#2128669
- Switch to using %autopatch as in Fedora


Related CVEs


CVE-2024-2357

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) libreswan-4.12-1.0.1.el9_3.1.src.rpm6a59cd623f09a976e6858d50edf53e5b1dff3b8a913903997c1346481c78ed74-ol9_aarch64_appstream
libreswan-4.12-1.0.1.el9_3.1.aarch64.rpmdf47f9c368c06bdd6100274eba295f2c38431a7e76d6f20cfd027832b2e06557-ol9_aarch64_appstream
Oracle Linux 9 (x86_64) libreswan-4.12-1.0.1.el9_3.1.src.rpm6a59cd623f09a976e6858d50edf53e5b1dff3b8a913903997c1346481c78ed74-ol9_x86_64_appstream
libreswan-4.12-1.0.1.el9_3.1.x86_64.rpm67595dd0523c938ec34652dcb21bf9130df969070111ff48ea399db41b15b52b-ol9_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete