libreswan vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libreswan package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

*
  • M
Resource Exhaustion

*
  • M
Reachable Assertion

*
  • M
NULL Pointer Dereference

*
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • M
Reachable Assertion

<0:3.12-10.1.el7_1
  • L
Improper Validation of Integrity Check Value

*
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Improper Input Validation

<0:3.15-8.el7
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Reachable Assertion

<0:3.15-5.el7_1
  • M
Missing Required Cryptographic Step

*