First published: Sat Jan 15 2022(Updated: )
Libreswan 4.2 through 4.5 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libreswan | 3.27-6+deb10u1 4.3-1+deb11u4 4.3-1+deb11u3 4.10-2+deb12u1 4.12-1 | |
Libreswan Libreswan | >=4.2<4.6 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-23094.
The severity of CVE-2022-23094 is high with a severity value of 7.5.
CVE-2022-23094 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) in Libreswan versions 4.2 through 4.5.
You can fix CVE-2022-23094 by updating to Libreswan version 4.6 or applying the patch provided by the vendor.
You can find more information about CVE-2022-23094 at the following references: [link1], [link2], [link3].