Bug 13320

Summary: [CVE 21] strongswan 5.9.1 CVEs found
Product: [ROSA-based products] ROSA Fresh Reporter: Yury <y.tumanov>
Component: System (kernel, glibc, systemd, bash, PAM...)Assignee: ROSA Linux Bugs <bugs>
Status: VERIFIED FIXED QA Contact: ROSA Linux Bugs <bugs>
Severity: normal    
Priority: Normal CC: a.proklov, i.gaptrakhmanov, pastordidi, s.matveev, v.potapov, y.tumanov
Version: AllFlags: v.potapov: qa_verified+
y.tumanov: secteam_verified+
a.proklov: published+
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: CVE-2021-41990, CVE-2021-41991, CVE-2021-45079, CVE-2022-40617,
Whiteboard:
Platform: 2021.1 ROSA Vulnerability identifier:
RPM Package: ISO-related:
Bad POT generating: Upstream:

Description Yury 2023-05-03 18:03:05 MSK
Please patch CVEs for package strongswan version 5.9.1
  
INFO (CVEs are): strongswan 5.9.1
 cves found
CVE-2021-41990
Desc: The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-41990
Severity: HIGH
CVE-2021-41991
Desc: The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-41991
Severity: HIGH
CVE-2021-45079
Desc: In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-45079
Severity: CRITICAL
CVE-2022-40617
Desc: strongSwan before 5.9.8 allows remote attackers to cause a denial of service in the revocation plugin by sending a crafted end-entity (and intermediate CA) certificate that contains a CRL/OCSP URL that points to a server (under the attacker's control) that doesn't properly respond but (for example) just does nothing after the initial TCP handshake, or sends an excessive amount of application data.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-40617
Severity: HIGH
Comment 1 ilfat 2023-05-22 19:26:59 MSK
********** QA ADVISORY **********

SVEs closed by project update:

Updated to 5.9.10

https://abf.io/build_lists/4443016 i686
https://abf.io/build_lists/4443014 x86_64
https://abf.io/build_lists/4443015 aarch64
Comment 2 Dmitry Postnikov 2023-05-23 22:13:53 MSK
***************************
The update sent to testings
Comment 3 Vladimir Potapov 2023-05-31 09:37:16 MSK
strongswan-5.9.10-1
https://abf.io/build_lists/4443016 i686
https://abf.io/build_lists/4443014 x86_64
https://abf.io/build_lists/4443015 aarch64
**************************** Advisory ***********************
SVEs closed by project update:

Updated to 5.9.10
*************************************************************
QA Verified
Comment 4 Yury 2023-07-26 17:32:18 MSK
Secteam Verified