blob: 03a3682cd75ef5f4e085d33937045da4797ba6a9 [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<glsa id="201603-13">
<title>Libreswan: Multiple Vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in libreSwan possibly
resulting in Denial of Service.
<product type="ebuild"></product>
<announced>March 12, 2016</announced>
<revised>March 12, 2016: 1</revised>
<package name="net-misc/libreswan" auto="yes" arch="*">
<unaffected range="ge">3.15</unaffected>
<vulnerable range="lt">3.15</vulnerable>
<p>Libreswan is a free software implementation of the most widely supported
and standarized VPN protocol based on (“IPsec”) and the Internet Key
Exchange (“IKE”).
<p>The pluto IKE daemon in Libreswan, when built with NSS, allows remote
attackers to cause a Denial of Service (assertion failure and daemon
restart) via a zero DH g^x value in a KE payload in a IKE packet.
Additionally, remote attackers could cause a Denial of Service (daemon
restart) via an IKEv1 packet with (1) unassigned bits set in the IPSEC
DOI value or (2) the next payload value set to ISAKMP_NEXT_SAK.
<impact type="normal">
<p>Remote attackers could possibly cause Denial of Service.</p>
<p>There is no known workaround at this time.</p>
<p>All Libreswan users should upgrade to the latest version:</p>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-misc/libreswan-3.15"
<uri link="">CVE-2015-3204</uri>
<uri link="">CVE-2015-3240</uri>
<metadata tag="requester" timestamp="Thu, 31 Dec 2015 05:09:11 +0000">
<metadata tag="submitter" timestamp="Sat, 12 Mar 2016 23:20:43 +0000">b-man</metadata>