Bug 33286 - strongswan new security issue CVE-2023-41913
Summary: strongswan new security issue CVE-2023-41913
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2024-06-11 15:22 CEST by Nicolas Salguero
Modified: 2024-06-12 18:10 CEST (History)
3 users (show)

See Also:
Source RPM: strongswan-5.9.10-3.mga9.src.rpm
CVE: CVE-2023-41913
Status comment: Fixed upstream in 5.9.14 and patch available from upstream


Attachments

Nicolas Salguero 2024-06-11 15:22:59 CEST

CVE: (none) => CVE-2023-41913
Status comment: (none) => Fixed upstream in 5.9.14 and patch available from upstream
Source RPM: (none) => strongswan-5.9.10-3.mga9.src.rpm

Comment 1 David GEIGER 2024-06-11 17:18:15 CEST
Assigning to QA,

Packages in 9/Core/Updates_testing:
======================
libstrongswan0-5.9.14-1.mga9
lib64strongswan0-5.9.14-1.mga9
strongswan-5.9.14-1.mga9
strongswan-charon-nm-5.9.14-1.mga9
strongswan-tnc-imcvs-5.9.14-1.mga9

From SRPMS:
strongswan-5.9.14-1.mga9.src.rpm

CC: (none) => geiger.david68210
Assignee: bugsquad => qa-bugs

katnatek 2024-06-12 02:04:48 CEST

Keywords: (none) => advisory

Comment 2 katnatek 2024-06-12 03:34:29 CEST
RH mageia 9 x86_64

Not previous rounds and looks a few complex to test

Install current version

LC_ALL=C urpmi lib64strongswan0 strongswan strongswan-charon-nm strongswan-tnc-imcvs
To satisfy dependencies, the following packages are going to be installed:
  Package                        Version      Release       Arch    
(medium "Core Release (distrib1)")
  lib64nm0                       1.40.18      2.mga9        x86_64  
  lib64strongswan0               5.9.10       3.mga9        x86_64  
  lib64tspi1                     0.3.15       3.mga9        x86_64  
  strongswan                     5.9.10       3.mga9        x86_64  
  strongswan-charon-nm           5.9.10       3.mga9        x86_64  
  strongswan-tnc-imcvs           5.9.10       3.mga9        x86_64  
7.6MB of additional disk space will be used.
2.4MB of packages will be retrieved.
Proceed with the installation of the 6 packages? (Y/n) y


    https://mirror.math.princeton.edu/pub/mageia/distrib/9/x86_64/media/core/release/strongswan-tnc-imcvs-5.9.10-3.mga9.x86_64.rpm
    https://mirror.math.princeton.edu/pub/mageia/distrib/9/x86_64/media/core/release/strongswan-charon-nm-5.9.10-3.mga9.x86_64.rpm  
    https://mirror.math.princeton.edu/pub/mageia/distrib/9/x86_64/media/core/release/lib64strongswan0-5.9.10-3.mga9.x86_64.rpm      
    https://mirror.math.princeton.edu/pub/mageia/distrib/9/x86_64/media/core/release/lib64tspi1-0.3.15-3.mga9.x86_64.rpm            
    https://mirror.math.princeton.edu/pub/mageia/distrib/9/x86_64/media/core/release/lib64nm0-1.40.18-2.mga9.x86_64.rpm             
    https://mirror.math.princeton.edu/pub/mageia/distrib/9/x86_64/media/core/release/strongswan-5.9.10-3.mga9.x86_64.rpm            
installing lib64nm0-1.40.18-2.mga9.x86_64.rpm strongswan-5.9.10-3.mga9.x86_64.rpm strongswan-tnc-imcvs-5.9.10-3.mga9.x86_64.rpm strongswan-charon-nm-5.9.10-3.mga9.x86_64.rpm lib64tspi1-0.3.15-3.mga9.x86_64.rpm lib64strongswan0-5.9.10-3.mga9.x86_64.rpm from /var/cache/urpmi/rpms
Preparing...                     ##################################################################################################
      1/6: lib64tspi1            ##################################################################################################
      2/6: lib64strongswan0      ##################################################################################################
      3/6: strongswan            ##################################################################################################
      4/6: lib64nm0              ##################################################################################################
      5/6: strongswan-charon-nm  ##################################################################################################
      6/6: strongswan-tnc-imcvs  ##################################################################################################

Update to testing version

LC_ALL=C urpmi --auto --auto-update
medium "QA Testing (64-bit)" is up-to-date
medium "Core Release (distrib1)" is up-to-date
medium "Core Updates (distrib3)" is up-to-date
medium "Nonfree Release (distrib11)" is up-to-date
medium "Nonfree Updates (distrib13)" is up-to-date
medium "Tainted Release (distrib21)" is up-to-date
medium "Tainted Updates (distrib23)" is up-to-date
medium "Core 32bit Release (distrib31)" is up-to-date
medium "Core 32bit Updates (distrib32)" is up-to-date
medium "Nonfree 32bit Release (distrib36)" is up-to-date
medium "Tainted 32bit Release (distrib41)" is up-to-date
medium "Tainted 32bit Updates (distrib42)" is up-to-date
medium "BDK-Free-x86_64" is up-to-date
medium "BDK-Free-noarch" is up-to-date
medium "BDK-NonFree-x86_64" is up-to-date


installing strongswan-charon-nm-5.9.14-1.mga9.x86_64.rpm lib64strongswan0-5.9.14-1.mga9.x86_64.rpm strongswan-tnc-imcvs-5.9.14-1.mga9.x86_64.rpm strongswan-5.9.14-1.mga9.x86_64.rpm from //home/katnatek/qa-testing/x86_64
Preparing...                     ##################################################################################################
      1/4: lib64strongswan0      ##################################################################################################
      2/4: strongswan            ##################################################################################################
      3/4: strongswan-tnc-imcvs  ##################################################################################################
      4/4: strongswan-charon-nm  ##################################################################################################
      1/4: removing strongswan-tnc-imcvs-5.9.10-3.mga9.x86_64
                                 ##################################################################################################
      2/4: removing strongswan-5.9.10-3.mga9.x86_64
                                 ##################################################################################################
      3/4: removing strongswan-charon-nm-5.9.10-3.mga9.x86_64
                                 ##################################################################################################
      4/4: removing lib64strongswan0-5.9.10-3.mga9.x86_64
                                 ##################################################################################################

Give OK in base a clean install

CC: (none) => andrewsfarm
Whiteboard: (none) => MGA9-64-OK

Comment 3 Thomas Andrews 2024-06-12 16:04:58 CEST
MGA9-64 Plasma.

I had installed two of these packages as part of testing Bug 32888, which concerned non-functioning VPN dialogs in Network Manager Plasma applets. At the time, all I could do was install the applets, which brought in these two packages as dependencies, and start to add a new connection in the Plasma applet as if I wanted to set up a VPN. That bug involved a protocol other than ipsec, so I didn't happen to check it at that time.

I opened systemsettings/connections and acted as if I wanted to set up a strongswan VPN. The dialog opened without issue. I then backed out and updated:

The following 2 packages are going to be installed:

- lib64strongswan0-5.9.14-1.mga9.x86_64
- strongswan-charon-nm-5.9.14-1.mga9.x86_64

I repeated my "test" and the dialog again opened. That's as far as I can take it because I know nothing of strongswan VPNs, but it's better than nothing.

Confirming the OK, and validating.

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 4 Mageia Robot 2024-06-12 18:10:24 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2024-0216.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.