CVE-2023-30570 Malicious IKEv1 packet can cause libreswan to restart

The Libreswan Project released a security patch affecting libreswan versions 3.28 to 4.10 that can cause vulnerable versions to restart when receiving a malformed IKEv1 packet from an unauthenticated peer. Please upgrade to libreswan 4.11 (sig) or use the patch listed with the advisery CVE-2023-30570.

Libreswan VPN software

Libreswan is a free software implementation of the most widely supported and standardized VPN protocol using "IPsec" and the Internet Key Exchange ("IKE"). These standards are produced and maintained by the Internet Engineering Task Force ("IETF").

Libreswan has been under active development for over 15 years, going back to The FreeS/WAN Project founded in 1997 by John Gilmore and Hugh Daniel. For more information, see the project's History. Libreswan supports IKE versions 1 and 2. It runs on Linux 2.4 to 5.x, FreeBSD and Apple OSX. On Linux, it uses the built-in "XFRM" IPsec stack (linux-ipsec). It uses the NSS crypto library. The list of supported RFC's can be found at Implemented standards.


Libreswan is licensed under the GNU Public License ("GPLv2"). See the License. It ships as part of many Linux distributions, including Fedora, RHEL/EPEL and Arch Linux and can be installed on those systems using the native software management tools. The source code is available as tarball and via our git repository. Older versions, patches and pre-compiled versions are available on our download site.

Configuration examples

Common configuration examples can be found in our Wiki. Furthermore, our test cases also document our behaviour. You can find test case results and log files on our daily testing site at And of course, the manual page of ipsec.conf documents the configuration options as well.