CVE-2023-2295

A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libreswan:libreswan:4.9-1.el8:*:*:*:*:*:*:*
cpe:2.3:a:libreswan:libreswan:4.9-1.el9:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*

History

22 Jan 2025, 19:15

Type Values Removed Values Added
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2189777 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=2189777 - Issue Tracking
References (MISC) https://access.redhat.com/errata/RHSA-2023:3148 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2023:3148 - Third Party Advisory
References (MISC) https://access.redhat.com/errata/RHSA-2023:3107 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2023:3107 - Third Party Advisory
References (MISC) https://access.redhat.com/security/cve/CVE-2023-2295 - Third Party Advisory () https://access.redhat.com/security/cve/CVE-2023-2295 - Third Party Advisory

25 May 2023, 17:35

Type Values Removed Values Added
CPE cpe:2.3:o:redhat:enterprise_linux_server_aus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:a:libreswan:libreswan:4.9-1.el9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:libreswan:libreswan:4.9-1.el8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2189777 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2189777 - Issue Tracking
References (MISC) https://access.redhat.com/security/cve/CVE-2023-2295 - (MISC) https://access.redhat.com/security/cve/CVE-2023-2295 - Third Party Advisory
References (MISC) https://access.redhat.com/errata/RHSA-2023:3148 - (MISC) https://access.redhat.com/errata/RHSA-2023:3148 - Third Party Advisory
References (MISC) https://access.redhat.com/errata/RHSA-2023:3107 - (MISC) https://access.redhat.com/errata/RHSA-2023:3107 - Third Party Advisory
CWE NVD-CWE-noinfo
First Time Redhat enterprise Linux Server Aus
Libreswan
Redhat enterprise Linux
Libreswan libreswan
Redhat
Redhat enterprise Linux Eus
Redhat enterprise Linux Server Tus

17 May 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-17 23:15

Updated : 2025-01-22 19:15


NVD link : CVE-2023-2295

Mitre link : CVE-2023-2295


JSON object : View

Products Affected

redhat

  • enterprise_linux_server_aus
  • enterprise_linux
  • enterprise_linux_server_tus
  • enterprise_linux_eus

libreswan

  • libreswan