Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-3148

Опубликовано: 17 мая 2023
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2023-3148: libreswan security update (IMPORTANT)

[4.9-4.0.1]

  • Add libreswan-oracle.patch to detect Oracle Linux distro

[4.9-4]

  • Just bumping up the version as an incorrect 9.3 build was created.
  • Related: rhbz#2187171

[4.9-3]

  • Fix CVE-2023-30570:Malicious IKEv1 Aggressive Mode packets can crash libreswan
  • Resolves: rhbz#2187171

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

libreswan

4.9-4.0.1.el9_2

Oracle Linux x86_64

libreswan

4.9-4.0.1.el9_2

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.

CVSS3: 7.5
redhat
больше 2 лет назад

A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.

CVSS3: 7.5
nvd
больше 2 лет назад

A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.

CVSS3: 7.5
debian
больше 2 лет назад

A vulnerability was found in the libreswan library. This security issu ...

rocky
около 2 лет назад

Important: libreswan security update