{"id":"CVE-2019-12312","details":"In Libreswan 3.27 an assertion failure can lead to a pluto IKE daemon restart. An attacker can trigger a NULL pointer dereference by initiating an IKEv2 IKE_SA_INIT exchange, followed by a bogus INFORMATIONAL exchange instead of the normallly expected IKE_AUTH exchange. This affects send_v2N_spi_response_from_state() in programs/pluto/ikev2_send.c that will then trigger a NULL pointer dereference leading to a restart of libreswan.","modified":"2026-04-11T21:44:20.596803Z","published":"2019-05-24T14:29:00.230Z","references":[{"type":"WEB","url":"https://libreswan.org/security/CVE-2019-12312/CVE-2019-12312.txt"},{"type":"WEB","url":"https://libreswan.org/security/CVE-2019-12312/libreswan-3.27-CVE-2019-12312.patch"},{"type":"ADVISORY","url":"https://github.com/libreswan/libreswan/issues/246"},{"type":"FIX","url":"https://github.com/libreswan/libreswan/compare/9b1394e...3897683"},{"type":"EVIDENCE","url":"http://www.iwantacve.cn/index.php/archives/218/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libreswan/libreswan","events":[{"introduced":"0"},{"fixed":"3897683ffe3597b9e57041876c88de73dc2d04cf"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"3.28"}],"cpe":"cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["0.9.9","libreswan-0.0.1","pre_FreeBSD_merge_200607","v2.5.01","v2.5.03","v2.6.01","v2.6.03","v2.6.07","v2.6.14","v2.6.15","v2.6.15dr2","v2.6.16","v2.6.16dr1","v2.6.16dr2","v2.6.16dr3","v2.6.16dr4","v2.6.16dr5","v2.6.18","v2.6.18rc1","v2.6.19","v2.6.20","v2.6.20bis","v2.6.20rc2","v2.6.21","v2.6.22dr1","v2.6.23","v2.6.23dr1","v2.6.24","v2.6.24rc2","v2.6.24rc3","v2.6.24rc4","v2.6.24rc5","v2.6.26","v2.6.26rc1","v2.6.27dr1","v2.6.28dr1","v2.6.29","v2.6.29rc2","v2.6.32","v2.6.32dr1","v2.6.32dr3","v2.6.32dr4","v2.6.32dr5","v2.6.32rc1","v2.6.32rc3","v2.6.32rc5","v2.6.32rc6","v2.6.32rc7","v2.6.32rc8","v2.6.32rc9","v2.6.33dr2","v2.6.33rc1","v2.6.34","v2.6.34dr1","v2.6.34dr2","v2.6.34rc1","v2.6.34rc2","v2.6.34rc5","v2.6.34rc6","v2.6.35dr1","v2.6.36","v2.6.36dr1","v2.6.36rc1","v2.6.37","v2.6.38","v2.6.38dr2","v2.6.38rc1","v2.6.38rc2","v2.92","v2.93","v3.1","v3.11dr1","v3.14","v3.14rc2","v3.14rc3","v3.16","v3.16rc2","v3.16rc3","v3.17","v3.18","v3.18dr2","v3.19","v3.20","v3.20dr3","v3.20dr4","v3.21","v3.21rc5","v3.22","v3.22dr1","v3.25","v3.26","v3.27","v3.2rc1","v3.3","v3.4","v3.5","v3.6","v3.7"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-12312.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}