Debian Package Tracker
Register | Log in
Subscribe

libreswan

Internet Key Exchange daemon

Choose email to subscribe with

general
  • source: libreswan (main)
  • version: 5.2-2.2
  • maintainer: Daniel Kahn Gillmor (DMD)
  • uploaders: Paul Wouters [DMD] – Ondřej Surý [DMD]
  • arch: any
  • std-ver: 4.7.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.27-6+deb10u1
  • o-o-sec: 3.27-6+deb10u1
  • oldstable: 4.3-1+deb11u4
  • old-sec: 4.3-1+deb11u3
  • stable: 4.10-2+deb12u1
  • testing: 5.2-2.1
  • unstable: 5.2-2.2
versioned links
  • 3.27-6+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.3-1+deb11u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.3-1+deb11u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.10-2+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.2-2.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.2-2.2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libreswan (5 bugs: 0, 4, 1, 0)
action needed
Marked for autoremoval on 04 June: #1073665 high
Version 5.2-2.1 of libreswan is marked for autoremoval from testing on Wed 04 Jun 2025. It is affected by #1073665. You should try to prevent the removal by fixing these RC bugs.
Created: 2025-05-06 Last update: 2025-05-25 07:32
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2025-05-10 Last update: 2025-05-23 06:32
5 security issues in bookworm high

There are 5 open security issues in bookworm.

4 important issues:
  • CVE-2024-3652: The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not affected.
  • CVE-2023-38710: An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.
  • CVE-2023-38711: An issue was discovered in Libreswan before 4.12. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR receives an IDcr payload with ID_FQDN, a NULL pointer dereference causes a crash and restart of the pluto daemon. NOTE: the earliest affected version is 4.6.
  • CVE-2023-38712: An issue was discovered in Libreswan 3.x and 4.x before 4.12. When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a NULL pointer dereference on the deleted state causes the pluto daemon to crash and restart.
1 issue left for the package maintainer to handle:
  • CVE-2024-2357: (needs triaging) The Libreswan Project was notified of an issue causing libreswan to restart under some IKEv2 retransmit scenarios when a connection is configured to use PreSharedKeys (authby=secret) and the connection cannot find a matching configured secret. When such a connection is automatically added on startup using the auto= keyword, it can cause repeated crashes leading to a Denial of Service.

You can find information about how to handle this issue in the security team's documentation.

Created: 2023-08-17 Last update: 2025-05-10 07:04
4 security issues in buster high

There are 4 open security issues in buster.

4 important issues:
  • CVE-2024-2357: The Libreswan Project was notified of an issue causing libreswan to restart under some IKEv2 retransmit scenarios when a connection is configured to use PreSharedKeys (authby=secret) and the connection cannot find a matching configured secret. When such a connection is automatically added on startup using the auto= keyword, it can cause repeated crashes leading to a Denial of Service.
  • CVE-2024-3652: The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not affected.
  • CVE-2023-38710: An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.
  • CVE-2023-38712: An issue was discovered in Libreswan 3.x and 4.x before 4.12. When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a NULL pointer dereference on the deleted state causes the pluto daemon to crash and restart.
Created: 2023-08-17 Last update: 2024-06-09 21:00
1 bug tagged help in the BTS normal
The BTS contains 1 bug tagged help, please consider helping the maintainer in dealing with it.
Created: 2019-03-21 Last update: 2025-05-25 07:30
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2025-01-06 Last update: 2025-05-25 07:30
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2025-04-10 Last update: 2025-04-10 00:31
debian/patches: 1 patch to forward upstream low

Among the 3 debian patches available in version 5.2-2.2 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-05-10 11:34
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2025-01-16 Last update: 2025-01-16 16:33
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.7.1).
Created: 2025-02-27 Last update: 2025-05-10 07:05
testing migrations
  • excuses:
    • Migration status for libreswan (5.2-2.1 to 5.2-2.2): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Too young, only 15 of 20 days old
    • Additional info:
    • ∙ ∙ Updating libreswan will fix bugs in testing: #1073665
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/libr/libreswan.html
    • ∙ ∙ autopkgtest for libreswan/5.2-2.2: amd64: Pass, arm64: Pass, armel: Pass, armhf: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Reproducible on amd64 - info ♻
    • ∙ ∙ Reproducible on arm64 - info ♻
    • ∙ ∙ Waiting for reproducibility test results on armhf - info ♻
    • ∙ ∙ Reproducible on i386 - info ♻
    • ∙ ∙ not blocked: has successful autopkgtest
    • Not considered
news
[rss feed]
  • [2025-05-09] Accepted libreswan 5.2-2.2 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-03-28] libreswan 5.2-2.1 MIGRATED to testing (Debian testing watch)
  • [2025-03-26] Accepted libreswan 5.2-2.1 (source) into unstable (Michael Biebl)
  • [2025-03-08] libreswan 5.2-2 MIGRATED to testing (Debian testing watch)
  • [2025-03-04] Accepted libreswan 5.2-2 (source) into unstable (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • [2025-03-02] libreswan 4.15-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-27] Accepted libreswan 5.2-1 (source) into experimental (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • [2025-02-27] Accepted libreswan 4.15-1 (source) into unstable (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • [2024-10-05] libreswan 4.14-1.1 MIGRATED to testing (Debian testing watch)
  • [2024-09-25] Accepted libreswan 4.14-1.1 (source) into unstable (Michael Biebl)
  • [2024-08-24] libreswan REMOVED from testing (Debian testing watch)
  • [2024-05-04] libreswan 4.14-1 MIGRATED to testing (Debian testing watch)
  • [2024-03-14] Accepted libreswan 5.0~rc2-2 (source) into experimental (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • [2024-03-12] Accepted libreswan 4.14-1 (source) into unstable (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • [2024-03-12] Accepted libreswan 5.0~rc2-1 (source) into experimental (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • [2024-03-12] Accepted libreswan 4.12-3 (source) into unstable (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • [2024-03-12] Accepted libreswan 4.12-2 (source) into unstable (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • [2024-02-16] libreswan REMOVED from testing (Debian testing watch)
  • [2023-08-13] libreswan 4.12-1 MIGRATED to testing (Debian testing watch)
  • [2023-08-10] Accepted libreswan 4.12-1 (source) into unstable (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • [2023-06-16] Accepted libreswan 4.3-1+deb11u4 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: dkg@debian.org)
  • [2023-06-13] libreswan 4.11-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-02] Accepted libreswan 4.10-2+deb12u1 (source) into testing-proposed-updates (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • [2023-06-02] Accepted libreswan 4.11-1 (source) into unstable (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • [2023-03-31] libreswan 4.10-2 MIGRATED to testing (Debian testing watch)
  • [2023-03-10] Accepted libreswan 4.10-2 (source) into unstable (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • [2023-03-10] Accepted libreswan 4.3-1+deb11u3 (source) into proposed-updates (Debian FTP Masters) (signed by: dkg@debian.org)
  • [2023-03-03] Accepted libreswan 4.3-1+deb11u3 (source) into stable-security (Debian FTP Masters) (signed by: dkg@debian.org)
  • [2023-03-03] Accepted libreswan 4.10-1 (source) into unstable (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • [2023-02-22] Accepted libreswan 4.9-2 (source) into unstable (Daniel Kahn Gillmor) (signed by: dkg@debian.org)
  • 1
  • 2
bugs [bug history graph]
  • all: 5
  • RC: 0
  • I&N: 4
  • M&W: 1
  • F&P: 0
  • patch: 1
  • help: 1
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 4.14-1ubuntu2
  • 4 bugs
  • patches for 4.14-1ubuntu2

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing