Количество 10
Количество 10
GHSA-4967-9mw7-522q
An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.

CVE-2023-38710
An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.

CVE-2023-38710
An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.

CVE-2023-38710
An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.

CVE-2023-38710
CVE-2023-38710
An issue was discovered in Libreswan before 4.12. When an IKEv2 Child ...

BDU:2023-05883
Уязвимость библиотеки VPN-протокола с использованием "IPsec" libreswan, связанная с достижимым утверждением, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»

ROS-20230913-03
Множественные уязвимости libreswan
ELSA-2023-7052
ELSA-2023-7052: libreswan security update (MODERATE)
ELSA-2023-6549
ELSA-2023-6549: libreswan security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-4967-9mw7-522q An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20. | CVSS3: 7.5 | 0% Низкий | почти 2 года назад | |
![]() | CVE-2023-38710 An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-38710 An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-38710 An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад |
![]() | CVSS3: 6.5 | 0% Низкий | почти 2 года назад | |
CVE-2023-38710 An issue was discovered in Libreswan before 4.12. When an IKEv2 Child ... | CVSS3: 6.5 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-05883 Уязвимость библиотеки VPN-протокола с использованием "IPsec" libreswan, связанная с достижимым утверждением, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» | CVSS3: 7.5 | 0% Низкий | почти 2 года назад |
![]() | ROS-20230913-03 Множественные уязвимости libreswan | CVSS3: 7.5 | почти 2 года назад | |
ELSA-2023-7052 ELSA-2023-7052: libreswan security update (MODERATE) | больше 1 года назад | |||
ELSA-2023-6549 ELSA-2023-6549: libreswan security update (MODERATE) | больше 1 года назад |
Уязвимостей на страницу