CVE Vulnerabilities

CVE-2023-38710

Published: Aug 25, 2023 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payloads protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.

Affected Software

NameVendorStart VersionEnd Version
LibreswanLibreswan3.20 (including)4.12 (excluding)
Red Hat Enterprise Linux 8RedHatlibreswan-0:4.12-2.el8*
Red Hat Enterprise Linux 9RedHatlibreswan-0:4.12-1.el9*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatlibreswan-0:4.6-3.el9_0.3*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatlibreswan-0:4.9-5.el9_2.4*
Red Hat OpenShift Container Platform 4.15RedHatlibreswan-0:4.6-3.el9_0.3*
Red Hat OpenShift Container Platform 4.16RedHatlibreswan-0:4.6-3.el9_0.3*
Red Hat OpenShift Container Platform 4.17RedHatlibreswan-0:4.6-3.el9_0.3*
LibreswanUbuntubionic*
LibreswanUbuntufocal*
LibreswanUbuntulunar*
LibreswanUbuntumantic*
LibreswanUbuntuoracular*
LibreswanUbuntuplucky*
LibreswanUbuntutrusty*
LibreswanUbuntuxenial*

References