Bug 1232320 (CVE-2015-3240)
| Summary: | CVE-2015-3240 libreswan / openswan: denial of service via IKE daemon restart when receiving a bad DH gx value | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | jrusnack, pwouters, security-response-team, slong |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: |
A flaw was discovered in the way Libreswan's IKE daemon processed IKE KE payloads. A remote attacker could send specially crafted IKE payload with a KE payload of g^x=0 that, when processed, would lead to a denial of service (daemon crash).
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2015-11-20 07:15:14 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1256802, 1256803, 1259206, 1259207, 1259208, 1259209 | ||
| Bug Blocks: | 1232321 | ||
|
Description
Vasyl Kaigorodov
2015-06-16 13:25:25 UTC
This issue is now public: https://libreswan.org/security/CVE-2015-3240/ Created libreswan tracking bugs for this issue: Affects: epel-all [bug 1256803] libreswan-3.15-1.fc21 has been pushed to the Fedora 21 testing repository. If problems still persist, please make note of it in this bug report.\nIf you want to test the update, you can install it with \n su -c 'yum --enablerepo=updates-testing update libreswan'. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2015-14179 note that using libreswan-3,15 you can test sending a bad g^x by running: ipsec start ipsec auto --add connname ipsec whack --debug-all --impair-send-zero-gx ipsec auto --up connname Acknowledgement: This issue was discovered by Paul Wouters of Red Hat. External References: https://libreswan.org/security/CVE-2015-3240/ This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:1979 https://rhn.redhat.com/errata/RHSA-2015-1979.html |