Bug 1031830 (CVE-2013-4564)
Summary: | CVE-2013-4564 libreswan: DoS due to how mangled IKE packets are handled | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | pfrields, pwouters |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | libreswan 3.7 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-11-18 23:17:56 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Vincent Danen
2013-11-18 21:50:19 UTC
Code to fix: https://github.com/libreswan/libreswan/commit/9b31deafbdbf0c2206358dfbf2d4e343e365f23f Closing as this does not affect anything we ship. External Reference: https://libreswan.org/security/CVE-2013-4564/CVE-2013-4564.txt.asc Also note that the upstream also explicitly notes: While the vulnerable code is present in all libreswan versions, and some openswan versions, only libreswan version 3.6 exposed this code to malicious IKE packets due to its new IKE padding feature. |