OESA-2022-2034

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2034
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2022-2034.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2022-2034
Upstream
Published
2022-11-03T11:04:29Z
Modified
2025-08-12T05:15:01.111067Z
Summary
strongswan security update
Details

The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key exchange protocols in conjunction with the native NETKEY IPsec stack of the Linux kernel.

Security Fix(es):

strongSwan before 5.9.8 allows remote attackers to cause a denial of service in the revocation plugin by sending a crafted end-entity (and intermediate CA) certificate that contains a CRL/OCSP URL that points to a server (under the attacker's control) that doesn't properly respond but (for example) just does nothing after the initial TCP handshake, or sends an excessive amount of application data.(CVE-2022-40617)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / strongswan

Package

Name
strongswan
Purl
pkg:rpm/openEuler/strongswan&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.7.2-9.oe1

Ecosystem specific

{
    "aarch64": [
        "strongswan-5.7.2-9.oe1.aarch64.rpm",
        "strongswan-debugsource-5.7.2-9.oe1.aarch64.rpm",
        "strongswan-debuginfo-5.7.2-9.oe1.aarch64.rpm"
    ],
    "src": [
        "strongswan-5.7.2-9.oe1.src.rpm"
    ],
    "x86_64": [
        "strongswan-debuginfo-5.7.2-9.oe1.x86_64.rpm",
        "strongswan-debugsource-5.7.2-9.oe1.x86_64.rpm",
        "strongswan-5.7.2-9.oe1.x86_64.rpm"
    ],
    "noarch": [
        "strongswan-help-5.7.2-9.oe1.noarch.rpm"
    ]
}

Database specific

source

"https://repo.openeuler.org/security/data/osv/OESA-2022-2034.json"

openEuler:20.03-LTS-SP3 / strongswan

Package

Name
strongswan
Purl
pkg:rpm/openEuler/strongswan&distro=openEuler-20.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.7.2-10.oe1

Ecosystem specific

{
    "aarch64": [
        "strongswan-debuginfo-5.7.2-10.oe1.aarch64.rpm",
        "strongswan-debugsource-5.7.2-10.oe1.aarch64.rpm",
        "strongswan-5.7.2-10.oe1.aarch64.rpm"
    ],
    "src": [
        "strongswan-5.7.2-10.oe1.src.rpm"
    ],
    "x86_64": [
        "strongswan-debuginfo-5.7.2-10.oe1.x86_64.rpm",
        "strongswan-5.7.2-10.oe1.x86_64.rpm",
        "strongswan-debugsource-5.7.2-10.oe1.x86_64.rpm"
    ],
    "noarch": [
        "strongswan-help-5.7.2-10.oe1.noarch.rpm"
    ]
}

Database specific

source

"https://repo.openeuler.org/security/data/osv/OESA-2022-2034.json"

openEuler:22.03-LTS / strongswan

Package

Name
strongswan
Purl
pkg:rpm/openEuler/strongswan&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.7.2-12.oe2203

Ecosystem specific

{
    "aarch64": [
        "strongswan-tnc-imcvs-5.7.2-12.oe2203.aarch64.rpm",
        "strongswan-libipsec-5.7.2-12.oe2203.aarch64.rpm",
        "strongswan-5.7.2-12.oe2203.aarch64.rpm",
        "strongswan-debugsource-5.7.2-12.oe2203.aarch64.rpm",
        "strongswan-charon-nm-5.7.2-12.oe2203.aarch64.rpm",
        "strongswan-debuginfo-5.7.2-12.oe2203.aarch64.rpm",
        "strongswan-sqlite-5.7.2-12.oe2203.aarch64.rpm"
    ],
    "src": [
        "strongswan-5.7.2-12.oe2203.src.rpm"
    ],
    "x86_64": [
        "strongswan-sqlite-5.7.2-12.oe2203.x86_64.rpm",
        "strongswan-libipsec-5.7.2-12.oe2203.x86_64.rpm",
        "strongswan-debuginfo-5.7.2-12.oe2203.x86_64.rpm",
        "strongswan-5.7.2-12.oe2203.x86_64.rpm",
        "strongswan-charon-nm-5.7.2-12.oe2203.x86_64.rpm",
        "strongswan-tnc-imcvs-5.7.2-12.oe2203.x86_64.rpm",
        "strongswan-debugsource-5.7.2-12.oe2203.x86_64.rpm"
    ]
}

Database specific

source

"https://repo.openeuler.org/security/data/osv/OESA-2022-2034.json"