The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not affected.

Project Subscriptions

Vendors Products
Libreswan Subscribe
Libreswan Subscribe
Enterprise Linux Subscribe
Openshift Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Eus Subscribe
Rhel Tus Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2024-32230 The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not affected.
Fixes

Solution

This issue is fixed in 4.15 and all later versions.


Workaround

As a workaround, adding an esp= line to all IKEv1 connections works around the issue. An example covering most common default configurations would be: esp=aes-sha2_512,aes-sha1,aes-sha2_256,aes-md5,3des-sha1,3des-md5.

History

Tue, 17 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Libreswan
Libreswan libreswan
CPEs cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:*
Vendors & Products Libreswan
Libreswan libreswan

Thu, 13 Feb 2025 01:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift
CPEs cpe:/a:redhat:openshift:4.15::el9
cpe:/a:redhat:openshift:4.16::el9
cpe:/a:redhat:openshift:4.17::el9
Vendors & Products Redhat openshift

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-404

Tue, 29 Oct 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: libreswan

Published:

Updated: 2025-02-13T17:52:56.700Z

Reserved: 2024-04-11T01:28:41.331Z

Link: CVE-2024-3652

cve-icon Vulnrichment

Updated: 2024-08-01T20:19:59.933Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-11T02:15:47.790

Modified: 2025-06-17T20:54:44.620

Link: CVE-2024-3652

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-04-15T00:00:00Z

Links: CVE-2024-3652 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses