MGASA-2024-0085

Source
https://advisories.mageia.org/MGASA-2024-0085.html
Import Source
https://advisories.mageia.org/MGASA-2024-0085.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0085
Related
Published
2024-03-24T04:57:19Z
Modified
2024-03-24T04:40:04Z
Summary
Updated libreswan packages fix security vulnerabilities
Details

The updated package fixes security vulnerabilities: pluto in Libreswan before 4.11 allows a denial of service (responder SPI mishandling and daemon crash) via unauthenticated IKEv1 Aggressive Mode packets. (CVE-2023-30570) An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALIDSPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. (CVE-2023-38710) An issue was discovered in Libreswan before 4.12. When an IKEv1 Quick Mode connection configured with IDIPV4ADDR or IDIPV6ADDR receives an IDcr payload with IDFQDN, a NULL pointer dereference causes a crash and restart of the pluto daemon. (CVE-2023-38711) An issue was discovered in Libreswan 3.x and 4.x before 4.12. When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a NULL pointer dereference on the deleted state causes the pluto daemon to crash and restart. (CVE-2023-38712)

References
Credits

Affected packages

Mageia:9 / libreswan

Package

Name
libreswan
Purl
pkg:rpm/mageia/libreswan?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12-1.mga9

Ecosystem specific

{
    "section": "core"
}