CVE-2023-23009: Libreswan 4.9 allows remote attackers to cause a denial of service (assert failure and daemon restart) via crafted TS payload with an incorrect selector length. Looks like this unreleased patch is the fix? https://github.com/libreswan/libreswan/commit/7ceef9a79cb14ea1f53bbab7681523994b0ca25e
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=d334e6df98206ec75361deadca1e72542711fc3a commit d334e6df98206ec75361deadca1e72542711fc3a Author: Hans de Graaff <graaff@gentoo.org> AuthorDate: 2023-03-05 07:58:04 +0000 Commit: Hans de Graaff <graaff@gentoo.org> CommitDate: 2023-03-05 08:41:58 +0000 net-vpn/libreswan: add 4.10 Bug: https://bugs.gentoo.org/897916 Signed-off-by: Hans de Graaff <graaff@gentoo.org> net-vpn/libreswan/Manifest | 1 + net-vpn/libreswan/libreswan-4.10.ebuild | 126 ++++++++++++++++++++++++++++++++ 2 files changed, 127 insertions(+)
graaff, does 4.10 fix this vulnerability?
v4.10 (February 28, 2023) * SECURITY IKEv2: Fixes https://libreswan.org/security/CVE-2023-23009 * IKEv1: only clean up a connection when it isn't deleted [Andrew]
Indeed then :) Please stabilize 4.10 when ready.
libreswan 4.11 is marked stable due to another security issue.