Bug 2225369 (CVE-2023-38712)

Summary: CVE-2023-38712 libreswan: Invalid IKEv1 repeat IKE SA delete causes crash and restart
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dueno, paul.wouters, rhel-crypto-maint, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---Flags: paul.wouters: needinfo? (trathi)
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: libreswan 4.12 Doc Type: If docs needed, set a value
Doc Text:
A NULL pointer dereference vulnerability was found in the Libreswan package. When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a NULL pointer dereference on the deleted state occurs. This flaw allows a malicious client or attacker to send a malformed IKEv1 Delete/Notify packet, causing a crash and restarting the libreswan pluto daemon. When sent continuously, this could lead to a denial of service attack.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2215955, 2215956, 2230238    
Bug Blocks: 2225370    

Description TEJ RATHI 2023-07-25 05:37:15 UTC
When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a null pointer dereference on the deleted state causes the pluto daemon to crash and restart.

https://libreswan.org/security/CVE-2023-38712/CVE-2023-38712.txt

Comment 1 TEJ RATHI 2023-07-25 06:08:23 UTC
Vulnerable versions : libreswan 3.00 - 4.11
Not vulnerable      : libreswan 4.12+

Vulnerable code was present from the first release of libreswan i.e libreswan v3.0 (likely the same vulnerability exists in all openswan versions)

Comment 3 TEJ RATHI 2023-08-09 05:39:29 UTC
Created libreswan tracking bugs for this issue:

Affects: fedora-all [bug 2230238]

Comment 4 errata-xmlrpc 2023-11-07 08:19:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6549 https://access.redhat.com/errata/RHSA-2023:6549

Comment 5 errata-xmlrpc 2023-11-14 15:19:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:7052 https://access.redhat.com/errata/RHSA-2023:7052

Comment 6 Paul Wouters 2024-06-23 01:11:59 UTC
this bug should be closed (can't see all the things it depends on but based on fedora and the above RHEL 8/9, seems like all the work was done)

Comment 7 errata-xmlrpc 2024-12-02 01:17:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:10594 https://access.redhat.com/errata/RHSA-2024:10594

Comment 8 errata-xmlrpc 2025-01-14 10:45:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2025:0309 https://access.redhat.com/errata/RHSA-2025:0309