libreswan vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libreswan package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Reachable Assertion

<0:4.5-1.el8_6.3
  • M
Reachable Assertion

<0:4.5-1.el8_6.3
  • M
Reachable Assertion

<0:4.5-1.el8_6.3
  • M
Reachable Assertion

<0:4.9-3.el8_8.2
  • M
Reachable Assertion

<0:4.9-3.el8_8.2
  • M
Reachable Assertion

<0:4.9-3.el8_8.2
  • M
Reachable Assertion

<0:4.9-3.el8_8.2
  • M
Resource Exhaustion

<0:4.9-3.el8_8.1
  • M
Resource Exhaustion

<0:4.9-3.el8_8.1
  • M
Resource Exhaustion

<0:4.9-3.el8_8.1
  • M
Resource Exhaustion

<0:4.9-3.el8_8.1
  • M
Resource Exhaustion

<0:4.5-1.el8_6.2
  • M
Resource Exhaustion

<0:4.5-1.el8_6.2
  • M
Resource Exhaustion

<0:4.5-1.el8_6.2
  • M
Resource Exhaustion

<0:4.5-1.el8_6.2
  • M
Reachable Assertion

<0:4.12-2.el8_10.4
  • M
Resource Exhaustion

<0:4.12-2.el8_9.2
  • M
NULL Pointer Dereference

<0:4.12-2.el8
  • M
Reachable Assertion

<0:4.12-2.el8
  • M
NULL Pointer Dereference

<0:4.12-2.el8
  • H
Resource Exhaustion

<0:4.9-3.el8_8
  • H
Resource Exhaustion

<0:4.9-3.el8_8
  • H
Resource Exhaustion

<0:4.9-3.el8_8
  • H
Resource Exhaustion

<0:4.9-3.el8_8
  • H
Resource Exhaustion

<0:4.9-3.el8_8
  • H
Resource Exhaustion

<0:4.5-1.el8_7.1
  • H
Resource Exhaustion

<0:3.29-7.el8_2.2
  • H
Resource Exhaustion

<0:4.3-6.el8_4.1
  • H
Resource Exhaustion

<0:3.29-7.el8_2.2
  • H
Resource Exhaustion

<0:4.3-6.el8_4.1
  • H
Resource Exhaustion

<0:4.5-1.el8_7.1
  • H
Resource Exhaustion

<0:3.29-7.el8_1.2
  • H
Resource Exhaustion

<0:4.3-6.el8_4.1
  • H
Resource Exhaustion

<0:3.29-7.el8_2.2
  • H
Resource Exhaustion

<0:4.5-1.el8_7.1
  • H
Resource Exhaustion

<0:4.5-1.el8_6.1
  • H
Resource Exhaustion

<0:4.3-6.el8_4.1
  • H
Resource Exhaustion

<0:4.5-1.el8_7.1
  • H
Resource Exhaustion

<0:4.5-1.el8_6.1
  • H
Resource Exhaustion

<0:4.5-1.el8_6.1
  • H
Resource Exhaustion

<0:4.5-1.el8_6.1
  • H
Resource Exhaustion

<0:4.5-1.el8_7.1
  • M
Improper Input Validation

<0:4.9-2.el8_8.2
  • M
Improper Input Validation

<0:4.9-2.el8_8.2
  • M
Improper Input Validation

<0:4.9-2.el8_8.2
  • M
Improper Input Validation

<0:4.9-2.el8_8.2
  • M
Improper Input Validation

<0:4.9-2.el8_8.2
  • H
NULL Pointer Dereference

<0:4.4-4.el8_5
  • H
NULL Pointer Dereference

<0:4.4-4.el8_5
  • H
NULL Pointer Dereference

<0:4.4-4.el8_5
  • H
NULL Pointer Dereference

<0:4.4-4.el8_5
  • H
NULL Pointer Dereference

<0:4.3-6.el8_4
  • H
NULL Pointer Dereference

<0:4.4-4.el8_5
  • H
NULL Pointer Dereference

<0:4.3-6.el8_4
  • H
NULL Pointer Dereference

<0:4.4-4.el8_5
  • H
NULL Pointer Dereference

<0:4.4-4.el8_5
  • H
NULL Pointer Dereference

<0:4.4-4.el8_5
  • H
NULL Pointer Dereference

<0:4.3-6.el8_4
  • H
NULL Pointer Dereference

<0:4.4-4.el8_5
  • H
NULL Pointer Dereference

<0:4.3-6.el8_4
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_1
  • H
Out-of-bounds Read

<0:3.29-7.el8_1
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.27-10.el8_0
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • H
Out-of-bounds Read

<0:3.29-7.el8_2
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
NULL Pointer Dereference

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • L
Improper Validation of Integrity Check Value

<0:3.29-6.el8
  • M
Missing Required Cryptographic Step

*