Back to bug 2215952

Who When What Removed Added
TEJ RATHI 2023-06-19 13:16:32 UTC CC security-response-team
TEJ RATHI 2023-06-19 13:17:09 UTC CC dueno
TEJ RATHI 2023-06-19 13:21:27 UTC Blocks 2215953
TEJ RATHI 2023-06-19 13:25:32 UTC Priority medium high
Severity medium high
TEJ RATHI 2023-06-19 13:30:49 UTC Depends On 2215955, 2215956
TEJ RATHI 2023-06-19 13:33:20 UTC Depends On 2215957
Red Hat Bugzilla 2023-07-07 08:31:57 UTC CC security-response-team
Assignee security-response-team nobody
CC security-response-team
TEJ RATHI 2023-07-25 05:29:57 UTC Severity high medium
Priority high medium
Summary EMBARGOED TRIAGE libreswan: pluto crashes and restarts by passing malicious packet EMBARGOED libreswan: Invalid IKEv1 Quick Mode ID causes restart
TEJ RATHI 2023-07-25 05:31:30 UTC Fixed In Version libreswan 4.12
TEJ RATHI 2023-07-25 05:32:18 UTC Comment 0 updated
TEJ RATHI 2023-07-25 05:33:57 UTC Deadline 2023-08-07
TEJ RATHI 2023-07-25 05:40:15 UTC Blocks 2225370
TEJ RATHI 2023-08-09 03:58:01 UTC Alias CVE-2023-38711
Summary EMBARGOED libreswan: Invalid IKEv1 Quick Mode ID causes restart EMBARGOED CVE-2023-38711 libreswan: Invalid IKEv1 Quick Mode ID causes restart
TEJ RATHI 2023-08-09 05:05:19 UTC Doc Text A null pointer dereference issue was discovered in Libreswan when processing IKEv1 Quick Mode requests. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR, receives an IDcr payload with ID_FQDN, a null pointer dereference causes a crash and restart of the pluto daemon. A malicious client or attacker could send a malformed IKEv1 Quick Mode packet which would cause a crash and restart of the libreswan pluto daemon. When sent continuously, this could lead to a denial of service attack.
TEJ RATHI 2023-08-09 05:06:07 UTC Doc Text A null pointer dereference issue was discovered in Libreswan when processing IKEv1 Quick Mode requests. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR, receives an IDcr payload with ID_FQDN, a null pointer dereference causes a crash and restart of the pluto daemon. A malicious client or attacker could send a malformed IKEv1 Quick Mode packet which would cause a crash and restart of the libreswan pluto daemon. When sent continuously, this could lead to a denial of service attack. A null pointer dereference issue was discovered in Libreswan when processing IKEv1 Quick Mode requests. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR, receives an IDcr payload with ID_FQDN, triggering a null pointer dereference error. A malicious client or attacker could send a malformed IKEv1 Quick Mode packet which would cause a crash and restart of the libreswan pluto daemon. When sent continuously, this could lead to a denial of service attack.
TEJ RATHI 2023-08-09 05:06:55 UTC Doc Text A null pointer dereference issue was discovered in Libreswan when processing IKEv1 Quick Mode requests. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR, receives an IDcr payload with ID_FQDN, triggering a null pointer dereference error. A malicious client or attacker could send a malformed IKEv1 Quick Mode packet which would cause a crash and restart of the libreswan pluto daemon. When sent continuously, this could lead to a denial of service attack. A null pointer dereference issue was discovered in Libreswan when processing IKEv1 Quick Mode requests. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR, receives an IDcr payload with ID_FQDN, which triggers a null pointer dereference error. A malicious client or attacker could send a malformed IKEv1 Quick Mode packet which would cause a crash and restart of the libreswan pluto daemon. When sent continuously, this could lead to a denial of service attack.
TEJ RATHI 2023-08-09 05:07:21 UTC Doc Text A null pointer dereference issue was discovered in Libreswan when processing IKEv1 Quick Mode requests. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR, receives an IDcr payload with ID_FQDN, which triggers a null pointer dereference error. A malicious client or attacker could send a malformed IKEv1 Quick Mode packet which would cause a crash and restart of the libreswan pluto daemon. When sent continuously, this could lead to a denial of service attack. A null pointer dereference issue was discovered in Libreswan when processing IKEv1 Quick Mode requests. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR, receives an IDcr payload with ID_FQDN, triggers a null pointer dereference error. A malicious client or attacker could send a malformed IKEv1 Quick Mode packet which would cause a crash and restart of the libreswan pluto daemon. When sent continuously, this could lead to a denial of service attack.
TEJ RATHI 2023-08-09 05:24:16 UTC Comment 0 updated
TEJ RATHI 2023-08-09 05:29:25 UTC Deadline 2023-08-07
Summary EMBARGOED CVE-2023-38711 libreswan: Invalid IKEv1 Quick Mode ID causes restart CVE-2023-38711 libreswan: Invalid IKEv1 Quick Mode ID causes restart
Group qe_staff, security
TEJ RATHI 2023-08-09 05:39:18 UTC Depends On 2230238
RaTasha Tillery-Smith 2023-08-09 14:08:45 UTC Doc Text A null pointer dereference issue was discovered in Libreswan when processing IKEv1 Quick Mode requests. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR, receives an IDcr payload with ID_FQDN, triggers a null pointer dereference error. A malicious client or attacker could send a malformed IKEv1 Quick Mode packet which would cause a crash and restart of the libreswan pluto daemon. When sent continuously, this could lead to a denial of service attack. A NULL pointer dereference flaw was found in Libreswan when processing IKEv1 Quick Mode requests. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR receives an IDcr payload with ID_FQDN, it triggers a NULL pointer dereference error. This flaw allows a malicious client or attacker to send a malformed IKEv1 Quick Mode packet, causing a crash and restart of the libreswan pluto daemon. When sent continuously, this issue leads to a denial of service attack.

Back to bug 2215952