Bug 2189777 (CVE-2023-2295)
Summary: | CVE-2023-2295 libreswan: Regression of CVE-2023-30570 fixes in the Red Hat Enterprise Linux | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | TEJ RATHI <trathi> |
Component: | vulnerability | Assignee: | Sahana Prasad <shebburn> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | dueno, security-response-team, shebburn |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | libreswan 4.9-3.el8_8, libreswan 4.9-4.el9_2 | Doc Type: | If docs needed, set a value |
Doc Text: |
A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-05-17 07:42:06 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2190147, 2190148 | ||
Bug Blocks: | 2187158 | ||
Deadline: | 2023-05-09 |
Description
TEJ RATHI
2023-04-26 06:34:48 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:3107 https://access.redhat.com/errata/RHSA-2023:3107 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:3148 https://access.redhat.com/errata/RHSA-2023:3148 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-2295 |