A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
History

Thu, 13 Feb 2025 00:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift
Redhat rhel E4s
CPEs cpe:/a:redhat:openshift:4.15::el9
cpe:/a:redhat:openshift:4.16::el9
cpe:/a:redhat:openshift:4.17::el9
cpe:/a:redhat:rhel_e4s:9.0
Vendors & Products Redhat openshift
Redhat rhel E4s

Wed, 22 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-01-22T18:25:15.561Z

Reserved: 2023-04-26T00:00:00.000Z

Link: CVE-2023-2295

cve-icon Vulnrichment

Updated: 2024-08-02T06:19:14.731Z

cve-icon NVD

Status : Modified

Published: 2023-05-17T23:15:09.250

Modified: 2025-01-22T19:15:08.283

Link: CVE-2023-2295

cve-icon Redhat

Severity : Important

Publid Date: 2023-05-09T00:00:00Z

Links: CVE-2023-2295 - Bugzilla