Gentoo: GLSA-202007-21: Libreswan: Denial of service
Gentoo: GLSA-202007-21: Libreswan: Denial of service
A vulnerability in Libreswan could lead to a Denial of Service condition.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202007-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Libreswan: Denial of service
Date: July 27, 2020
Bugs: #722696
ID: 202007-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A vulnerability in Libreswan could lead to a Denial of Service
condition.
Background
==========
Libreswan is a free software implementation of the most widely
supported and standarized VPN protocol based on (“IPsec”) and the
Internet Key Exchange (“IKE”).
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-vpn/libreswan < 3.32 >= 3.32
Description
===========
As a result of a bug in handling certain bogus encrypted IKEv1, while
building a log message that the packet has been dropped, a NULL pointer
dereference causes Libreswan to crash and restart when it attempts to
log the state name involved.
Impact
======
An attacker could cause a possible Denial of Service condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Libreswan users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-vpn/libreswan-3.32"
References
==========
[ 1 ] CVE-2020-1763
https://nvd.nist.gov/vuln/detail/CVE-2020-1763
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202007-21
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
This email address is being protected from spambots. You need JavaScript enabled to view it. or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2020 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5