Bug 2274448 (CVE-2024-3652)

Summary: CVE-2024-3652 libreswan: IKEv1 default AH/ESP responder can crash and restart
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: sbroz, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: libreswan 4.15, libreswan 5.0 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Libreswan, where it was identified to contain an assertion failure issue in the compute_proto_keymat() function. The vulnerability can be exploited when an IKEv1 connection is loaded with an AH/ESP default setting when no esp= line is present in the connection. This flaw allows an authenticated attacker to send the bogus AES-GMAC proposal request, triggering the issue and causing Libreswan to crash and restart. When this connection is automatically added on startup using the auto= keyword, it can cause repeated crashes, leading to a denial of service. No remote code execution is possible.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2275403    
Bug Blocks: 2274452    

Description TEJ RATHI 2024-04-11 05:54:43 UTC
libreswan can crash and restart when it is acting as an IKEv1 responder with AH/ESP default setting, when no esp= line is present in the connection configuration. The bug is triggered when after IKEv1 authentication has succeeded (via Main Mode or Aggressive Mode), a Quick Mode message is received containing a bogus AES-GMAC proposal.

When such a connection is automatically added on startup using the auto=keyword, it can cause repeated crashes leading to a Denial of Service. No Remote Code Execution is possible. IKEv2 connections are not vulnerable.

Vulnerable versions : libreswan 3.22 - 4.14

https://libreswan.org/security/CVE-2024-3652
https://github.com/libreswan/libreswan/issues/1665

Comment 2 Sandipan Roy 2024-04-17 04:45:09 UTC
Created libreswan tracking bugs for this issue:

Affects: fedora-all [bug 2275403]

Comment 5 errata-xmlrpc 2024-06-23 22:32:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:4050 https://access.redhat.com/errata/RHSA-2024:4050

Comment 6 errata-xmlrpc 2024-07-01 08:40:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:4200 https://access.redhat.com/errata/RHSA-2024:4200

Comment 7 errata-xmlrpc 2024-07-08 13:52:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:4377 https://access.redhat.com/errata/RHSA-2024:4377

Comment 8 errata-xmlrpc 2024-07-08 14:30:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:4376 https://access.redhat.com/errata/RHSA-2024:4376

Comment 9 errata-xmlrpc 2024-07-09 09:59:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:4417 https://access.redhat.com/errata/RHSA-2024:4417

Comment 10 errata-xmlrpc 2024-07-09 12:52:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:4431 https://access.redhat.com/errata/RHSA-2024:4431