A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat openshift
Redhat rhel E4s |
|
CPEs | cpe:/a:redhat:openshift:4.15::el9 cpe:/a:redhat:openshift:4.16::el9 cpe:/a:redhat:openshift:4.17::el9 cpe:/a:redhat:rhel_e4s:9.0 |
|
Vendors & Products |
Redhat openshift
Redhat rhel E4s |
Wed, 22 Jan 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-01-22T18:25:15.561Z
Reserved: 2023-04-26T00:00:00.000Z
Link: CVE-2023-2295

Updated: 2024-08-02T06:19:14.731Z

Status : Modified
Published: 2023-05-17T23:15:09.250
Modified: 2025-01-22T19:15:08.283
Link: CVE-2023-2295
