{
  "threat_severity" : "Moderate",
  "public_date" : "2023-08-08T00:00:00Z",
  "bugzilla" : {
    "description" : "libreswan: Invalid IKEv1 repeat IKE SA delete causes crash and restart",
    "id" : "2225369",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2225369"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-476",
  "details" : [ "An issue was discovered in Libreswan 3.x and 4.x before 4.12. When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a NULL pointer dereference on the deleted state causes the pluto daemon to crash and restart.", "A NULL pointer dereference vulnerability was found in the Libreswan package. When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a NULL pointer dereference on the deleted state occurs. This flaw allows a malicious client or attacker to send a malformed IKEv1 Delete/Notify packet, causing a crash and restarting the libreswan pluto daemon. When sent continuously, this could lead to a denial of service attack." ],
  "statement" : "IKEv1 Delete/Notify requests are only processed when received from authenticated peers, limiting the scope of possible attackers to peers who have successfully authenticated.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2023-11-14T00:00:00Z",
    "advisory" : "RHSA-2023:7052",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "libreswan-0:4.12-2.el8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6549",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "libreswan-0:4.12-1.el9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
    "release_date" : "2024-12-02T00:00:00Z",
    "advisory" : "RHSA-2024:10594",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.0",
    "package" : "libreswan-0:4.6-3.el9_0.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support",
    "release_date" : "2025-01-14T00:00:00Z",
    "advisory" : "RHSA-2025:0309",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.2",
    "package" : "libreswan-0:4.9-5.el9_2.4"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.15",
    "release_date" : "2025-01-02T00:00:00Z",
    "advisory" : "RHBA-2024:11565",
    "cpe" : "cpe:/a:redhat:openshift:4.15::el9",
    "package" : "libreswan-0:4.6-3.el9_0.3"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.16",
    "release_date" : "2025-01-02T00:00:00Z",
    "advisory" : "RHBA-2024:11505",
    "cpe" : "cpe:/a:redhat:openshift:4.16::el9",
    "package" : "libreswan-0:4.6-3.el9_0.3"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.17",
    "release_date" : "2025-01-02T00:00:00Z",
    "advisory" : "RHBA-2024:11525",
    "cpe" : "cpe:/a:redhat:openshift:4.17::el9",
    "package" : "libreswan-0:4.6-3.el9_0.3"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "libreswan",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "openswan",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "libreswan",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-38712\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-38712\nhttps://github.com/libreswan/libreswan/releases/tag/v4.12\nhttps://libreswan.org/security/CVE-2023-38712/CVE-2023-38712.txt" ],
  "name" : "CVE-2023-38712",
  "csaw" : false
}