Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-12823 (GCVE-0-2020-12823)
Vulnerability from cvelistv5
Published
2020-05-12 17:07
Modified
2024-08-04 12:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T12:04:22.887Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://gitlab.com/openconnect/openconnect/-/merge_requests/108"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugs.gentoo.org/721570"
},
{
"name": "[debian-lts-announce] 20200516 [SECURITY] [DLA 2212-1] openconnect security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html"
},
{
"name": "FEDORA-2020-143735a624",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/"
},
{
"name": "FEDORA-2020-2af15c566e",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/"
},
{
"name": "FEDORA-2020-bc22f06aa3",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/"
},
{
"name": "GLSA-202006-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202006-15"
},
{
"name": "openSUSE-SU-2020:0997",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html"
},
{
"name": "openSUSE-SU-2020:1027",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-07-21T20:06:07",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://gitlab.com/openconnect/openconnect/-/merge_requests/108"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugs.gentoo.org/721570"
},
{
"name": "[debian-lts-announce] 20200516 [SECURITY] [DLA 2212-1] openconnect security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html"
},
{
"name": "FEDORA-2020-143735a624",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/"
},
{
"name": "FEDORA-2020-2af15c566e",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/"
},
{
"name": "FEDORA-2020-bc22f06aa3",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/"
},
{
"name": "GLSA-202006-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202006-15"
},
{
"name": "openSUSE-SU-2020:0997",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html"
},
{
"name": "openSUSE-SU-2020:1027",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-12823",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.com/openconnect/openconnect/-/merge_requests/108",
"refsource": "MISC",
"url": "https://gitlab.com/openconnect/openconnect/-/merge_requests/108"
},
{
"name": "https://bugs.gentoo.org/721570",
"refsource": "MISC",
"url": "https://bugs.gentoo.org/721570"
},
{
"name": "[debian-lts-announce] 20200516 [SECURITY] [DLA 2212-1] openconnect security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html"
},
{
"name": "FEDORA-2020-143735a624",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/"
},
{
"name": "FEDORA-2020-2af15c566e",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/"
},
{
"name": "FEDORA-2020-bc22f06aa3",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/"
},
{
"name": "GLSA-202006-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202006-15"
},
{
"name": "openSUSE-SU-2020:0997",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html"
},
{
"name": "openSUSE-SU-2020:1027",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-12823",
"datePublished": "2020-05-12T17:07:15",
"dateReserved": "2020-05-12T00:00:00",
"dateUpdated": "2024-08-04T12:04:22.887Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2020-12823\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-05-12T18:15:13.473\",\"lastModified\":\"2024-11-21T05:00:20.483\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.\"},{\"lang\":\"es\",\"value\":\"OpenConnect versi\u00f3n 8.09, presenta un desbordamiento del b\u00fafer, causando una denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n) o posiblemente otro impacto no especificado, por medio de datos de certificado dise\u00f1ados en la funci\u00f3n get_cert_name en el archivo gnutls.c.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:infradead:openconnect:8.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31F251A6-4429-40A0-B237-E7AB9B58FFB1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B009C22E-30A4-4288-BCF6-C3E81DEAF45A\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugs.gentoo.org/721570\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/openconnect/openconnect/-/merge_requests/108\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202006-15\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugs.gentoo.org/721570\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/openconnect/openconnect/-/merge_requests/108\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202006-15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
opensuse-su-2020:1027-1
Vulnerability from csaf_opensuse
Published
2020-07-21 14:38
Modified
2020-07-21 14:38
Summary
Security update for openconnect
Notes
Title of the patch
Security update for openconnect
Description of the patch
This update for openconnect fixes the following issues:
- CVE-2020-12823: Fixed a buffer overflow via crafted certificate data which could have led to denial of service (bsc#1171862).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2020-1027
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openconnect",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openconnect fixes the following issues:\n\t \n- CVE-2020-12823: Fixed a buffer overflow via crafted certificate data which could have led to denial of service (bsc#1171862).\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1027",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1027-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1027-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAH5LUZ22G6KZDCULBOOKADOUFIV5COP/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1027-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAH5LUZ22G6KZDCULBOOKADOUFIV5COP/"
},
{
"category": "self",
"summary": "SUSE Bug 1171862",
"url": "https://bugzilla.suse.com/1171862"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12823 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12823/"
}
],
"title": "Security update for openconnect",
"tracking": {
"current_release_date": "2020-07-21T14:38:41Z",
"generator": {
"date": "2020-07-21T14:38:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1027-1",
"initial_release_date": "2020-07-21T14:38:41Z",
"revision_history": [
{
"date": "2020-07-21T14:38:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openconnect-lang-7.08-lp152.9.4.2.noarch",
"product": {
"name": "openconnect-lang-7.08-lp152.9.4.2.noarch",
"product_id": "openconnect-lang-7.08-lp152.9.4.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-lp152.9.4.2.x86_64",
"product": {
"name": "openconnect-7.08-lp152.9.4.2.x86_64",
"product_id": "openconnect-7.08-lp152.9.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-lp152.9.4.2.x86_64",
"product": {
"name": "openconnect-devel-7.08-lp152.9.4.2.x86_64",
"product_id": "openconnect-devel-7.08-lp152.9.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-lp152.9.4.2.x86_64",
"product": {
"name": "openconnect-doc-7.08-lp152.9.4.2.x86_64",
"product_id": "openconnect-doc-7.08-lp152.9.4.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-7.08-lp152.9.4.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:openconnect-7.08-lp152.9.4.2.x86_64"
},
"product_reference": "openconnect-7.08-lp152.9.4.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-7.08-lp152.9.4.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:openconnect-devel-7.08-lp152.9.4.2.x86_64"
},
"product_reference": "openconnect-devel-7.08-lp152.9.4.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-7.08-lp152.9.4.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:openconnect-doc-7.08-lp152.9.4.2.x86_64"
},
"product_reference": "openconnect-doc-7.08-lp152.9.4.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-7.08-lp152.9.4.2.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:openconnect-lang-7.08-lp152.9.4.2.noarch"
},
"product_reference": "openconnect-lang-7.08-lp152.9.4.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12823",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12823"
}
],
"notes": [
{
"category": "general",
"text": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:openconnect-7.08-lp152.9.4.2.x86_64",
"openSUSE Leap 15.2:openconnect-devel-7.08-lp152.9.4.2.x86_64",
"openSUSE Leap 15.2:openconnect-doc-7.08-lp152.9.4.2.x86_64",
"openSUSE Leap 15.2:openconnect-lang-7.08-lp152.9.4.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12823",
"url": "https://www.suse.com/security/cve/CVE-2020-12823"
},
{
"category": "external",
"summary": "SUSE Bug 1171862 for CVE-2020-12823",
"url": "https://bugzilla.suse.com/1171862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:openconnect-7.08-lp152.9.4.2.x86_64",
"openSUSE Leap 15.2:openconnect-devel-7.08-lp152.9.4.2.x86_64",
"openSUSE Leap 15.2:openconnect-doc-7.08-lp152.9.4.2.x86_64",
"openSUSE Leap 15.2:openconnect-lang-7.08-lp152.9.4.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:openconnect-7.08-lp152.9.4.2.x86_64",
"openSUSE Leap 15.2:openconnect-devel-7.08-lp152.9.4.2.x86_64",
"openSUSE Leap 15.2:openconnect-doc-7.08-lp152.9.4.2.x86_64",
"openSUSE Leap 15.2:openconnect-lang-7.08-lp152.9.4.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-07-21T14:38:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-12823"
}
]
}
opensuse-su-2020:0997-1
Vulnerability from csaf_opensuse
Published
2020-07-18 16:28
Modified
2020-07-18 16:28
Summary
Security update for openconnect
Notes
Title of the patch
Security update for openconnect
Description of the patch
This update for openconnect fixes the following issues:
- CVE-2020-12823: Fixed a buffer overflow via crafted certificate data which could have led to denial of service (bsc#1171862).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2020-997
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openconnect",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openconnect fixes the following issues:\n\t \n- CVE-2020-12823: Fixed a buffer overflow via crafted certificate data which could have led to denial of service (bsc#1171862).\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-997",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0997-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:0997-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVAAM5HHI3CZY2NH7XA6UIKOBYCJ3GMU/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:0997-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVAAM5HHI3CZY2NH7XA6UIKOBYCJ3GMU/"
},
{
"category": "self",
"summary": "SUSE Bug 1171862",
"url": "https://bugzilla.suse.com/1171862"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12823 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12823/"
}
],
"title": "Security update for openconnect",
"tracking": {
"current_release_date": "2020-07-18T16:28:21Z",
"generator": {
"date": "2020-07-18T16:28:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:0997-1",
"initial_release_date": "2020-07-18T16:28:21Z",
"revision_history": [
{
"date": "2020-07-18T16:28:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openconnect-lang-7.08-lp151.6.9.1.noarch",
"product": {
"name": "openconnect-lang-7.08-lp151.6.9.1.noarch",
"product_id": "openconnect-lang-7.08-lp151.6.9.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-lp151.6.9.1.x86_64",
"product": {
"name": "openconnect-7.08-lp151.6.9.1.x86_64",
"product_id": "openconnect-7.08-lp151.6.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-lp151.6.9.1.x86_64",
"product": {
"name": "openconnect-devel-7.08-lp151.6.9.1.x86_64",
"product_id": "openconnect-devel-7.08-lp151.6.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-lp151.6.9.1.x86_64",
"product": {
"name": "openconnect-doc-7.08-lp151.6.9.1.x86_64",
"product_id": "openconnect-doc-7.08-lp151.6.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-7.08-lp151.6.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:openconnect-7.08-lp151.6.9.1.x86_64"
},
"product_reference": "openconnect-7.08-lp151.6.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-7.08-lp151.6.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:openconnect-devel-7.08-lp151.6.9.1.x86_64"
},
"product_reference": "openconnect-devel-7.08-lp151.6.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-7.08-lp151.6.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:openconnect-doc-7.08-lp151.6.9.1.x86_64"
},
"product_reference": "openconnect-doc-7.08-lp151.6.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-7.08-lp151.6.9.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:openconnect-lang-7.08-lp151.6.9.1.noarch"
},
"product_reference": "openconnect-lang-7.08-lp151.6.9.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12823",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12823"
}
],
"notes": [
{
"category": "general",
"text": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:openconnect-7.08-lp151.6.9.1.x86_64",
"openSUSE Leap 15.1:openconnect-devel-7.08-lp151.6.9.1.x86_64",
"openSUSE Leap 15.1:openconnect-doc-7.08-lp151.6.9.1.x86_64",
"openSUSE Leap 15.1:openconnect-lang-7.08-lp151.6.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12823",
"url": "https://www.suse.com/security/cve/CVE-2020-12823"
},
{
"category": "external",
"summary": "SUSE Bug 1171862 for CVE-2020-12823",
"url": "https://bugzilla.suse.com/1171862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:openconnect-7.08-lp151.6.9.1.x86_64",
"openSUSE Leap 15.1:openconnect-devel-7.08-lp151.6.9.1.x86_64",
"openSUSE Leap 15.1:openconnect-doc-7.08-lp151.6.9.1.x86_64",
"openSUSE Leap 15.1:openconnect-lang-7.08-lp151.6.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:openconnect-7.08-lp151.6.9.1.x86_64",
"openSUSE Leap 15.1:openconnect-devel-7.08-lp151.6.9.1.x86_64",
"openSUSE Leap 15.1:openconnect-doc-7.08-lp151.6.9.1.x86_64",
"openSUSE Leap 15.1:openconnect-lang-7.08-lp151.6.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-07-18T16:28:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-12823"
}
]
}
opensuse-su-2024:11114-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libopenconnect5-8.10-2.6 on GA media
Notes
Title of the patch
libopenconnect5-8.10-2.6 on GA media
Description of the patch
These are all security issues fixed in the libopenconnect5-8.10-2.6 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11114
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libopenconnect5-8.10-2.6 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libopenconnect5-8.10-2.6 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11114",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11114-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20319 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12105 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12823 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12823/"
}
],
"title": "libopenconnect5-8.10-2.6 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11114-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenconnect5-8.10-2.6.aarch64",
"product": {
"name": "libopenconnect5-8.10-2.6.aarch64",
"product_id": "libopenconnect5-8.10-2.6.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-8.10-2.6.aarch64",
"product": {
"name": "openconnect-8.10-2.6.aarch64",
"product_id": "openconnect-8.10-2.6.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-bash-completion-8.10-2.6.aarch64",
"product": {
"name": "openconnect-bash-completion-8.10-2.6.aarch64",
"product_id": "openconnect-bash-completion-8.10-2.6.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-8.10-2.6.aarch64",
"product": {
"name": "openconnect-devel-8.10-2.6.aarch64",
"product_id": "openconnect-devel-8.10-2.6.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-8.10-2.6.aarch64",
"product": {
"name": "openconnect-doc-8.10-2.6.aarch64",
"product_id": "openconnect-doc-8.10-2.6.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-lang-8.10-2.6.aarch64",
"product": {
"name": "openconnect-lang-8.10-2.6.aarch64",
"product_id": "openconnect-lang-8.10-2.6.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenconnect5-8.10-2.6.ppc64le",
"product": {
"name": "libopenconnect5-8.10-2.6.ppc64le",
"product_id": "libopenconnect5-8.10-2.6.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-8.10-2.6.ppc64le",
"product": {
"name": "openconnect-8.10-2.6.ppc64le",
"product_id": "openconnect-8.10-2.6.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-bash-completion-8.10-2.6.ppc64le",
"product": {
"name": "openconnect-bash-completion-8.10-2.6.ppc64le",
"product_id": "openconnect-bash-completion-8.10-2.6.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-devel-8.10-2.6.ppc64le",
"product": {
"name": "openconnect-devel-8.10-2.6.ppc64le",
"product_id": "openconnect-devel-8.10-2.6.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-doc-8.10-2.6.ppc64le",
"product": {
"name": "openconnect-doc-8.10-2.6.ppc64le",
"product_id": "openconnect-doc-8.10-2.6.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-lang-8.10-2.6.ppc64le",
"product": {
"name": "openconnect-lang-8.10-2.6.ppc64le",
"product_id": "openconnect-lang-8.10-2.6.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenconnect5-8.10-2.6.s390x",
"product": {
"name": "libopenconnect5-8.10-2.6.s390x",
"product_id": "libopenconnect5-8.10-2.6.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-8.10-2.6.s390x",
"product": {
"name": "openconnect-8.10-2.6.s390x",
"product_id": "openconnect-8.10-2.6.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-bash-completion-8.10-2.6.s390x",
"product": {
"name": "openconnect-bash-completion-8.10-2.6.s390x",
"product_id": "openconnect-bash-completion-8.10-2.6.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-devel-8.10-2.6.s390x",
"product": {
"name": "openconnect-devel-8.10-2.6.s390x",
"product_id": "openconnect-devel-8.10-2.6.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-doc-8.10-2.6.s390x",
"product": {
"name": "openconnect-doc-8.10-2.6.s390x",
"product_id": "openconnect-doc-8.10-2.6.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-lang-8.10-2.6.s390x",
"product": {
"name": "openconnect-lang-8.10-2.6.s390x",
"product_id": "openconnect-lang-8.10-2.6.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenconnect5-8.10-2.6.x86_64",
"product": {
"name": "libopenconnect5-8.10-2.6.x86_64",
"product_id": "libopenconnect5-8.10-2.6.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-8.10-2.6.x86_64",
"product": {
"name": "openconnect-8.10-2.6.x86_64",
"product_id": "openconnect-8.10-2.6.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-bash-completion-8.10-2.6.x86_64",
"product": {
"name": "openconnect-bash-completion-8.10-2.6.x86_64",
"product_id": "openconnect-bash-completion-8.10-2.6.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-8.10-2.6.x86_64",
"product": {
"name": "openconnect-devel-8.10-2.6.x86_64",
"product_id": "openconnect-devel-8.10-2.6.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-8.10-2.6.x86_64",
"product": {
"name": "openconnect-doc-8.10-2.6.x86_64",
"product_id": "openconnect-doc-8.10-2.6.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-lang-8.10-2.6.x86_64",
"product": {
"name": "openconnect-lang-8.10-2.6.x86_64",
"product_id": "openconnect-lang-8.10-2.6.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-8.10-2.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenconnect5-8.10-2.6.aarch64"
},
"product_reference": "libopenconnect5-8.10-2.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-8.10-2.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenconnect5-8.10-2.6.ppc64le"
},
"product_reference": "libopenconnect5-8.10-2.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-8.10-2.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenconnect5-8.10-2.6.s390x"
},
"product_reference": "libopenconnect5-8.10-2.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-8.10-2.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenconnect5-8.10-2.6.x86_64"
},
"product_reference": "libopenconnect5-8.10-2.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-8.10-2.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-8.10-2.6.aarch64"
},
"product_reference": "openconnect-8.10-2.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-8.10-2.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-8.10-2.6.ppc64le"
},
"product_reference": "openconnect-8.10-2.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-8.10-2.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-8.10-2.6.s390x"
},
"product_reference": "openconnect-8.10-2.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-8.10-2.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-8.10-2.6.x86_64"
},
"product_reference": "openconnect-8.10-2.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-bash-completion-8.10-2.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.aarch64"
},
"product_reference": "openconnect-bash-completion-8.10-2.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-bash-completion-8.10-2.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.ppc64le"
},
"product_reference": "openconnect-bash-completion-8.10-2.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-bash-completion-8.10-2.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.s390x"
},
"product_reference": "openconnect-bash-completion-8.10-2.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-bash-completion-8.10-2.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.x86_64"
},
"product_reference": "openconnect-bash-completion-8.10-2.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-8.10-2.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-devel-8.10-2.6.aarch64"
},
"product_reference": "openconnect-devel-8.10-2.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-8.10-2.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-devel-8.10-2.6.ppc64le"
},
"product_reference": "openconnect-devel-8.10-2.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-8.10-2.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-devel-8.10-2.6.s390x"
},
"product_reference": "openconnect-devel-8.10-2.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-8.10-2.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-devel-8.10-2.6.x86_64"
},
"product_reference": "openconnect-devel-8.10-2.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-8.10-2.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-doc-8.10-2.6.aarch64"
},
"product_reference": "openconnect-doc-8.10-2.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-8.10-2.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-doc-8.10-2.6.ppc64le"
},
"product_reference": "openconnect-doc-8.10-2.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-8.10-2.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-doc-8.10-2.6.s390x"
},
"product_reference": "openconnect-doc-8.10-2.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-8.10-2.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-doc-8.10-2.6.x86_64"
},
"product_reference": "openconnect-doc-8.10-2.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-8.10-2.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-lang-8.10-2.6.aarch64"
},
"product_reference": "openconnect-lang-8.10-2.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-8.10-2.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-lang-8.10-2.6.ppc64le"
},
"product_reference": "openconnect-lang-8.10-2.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-8.10-2.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-lang-8.10-2.6.s390x"
},
"product_reference": "openconnect-lang-8.10-2.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-8.10-2.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openconnect-lang-8.10-2.6.x86_64"
},
"product_reference": "openconnect-lang-8.10-2.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-20319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20319"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.aarch64",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.s390x",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20319",
"url": "https://www.suse.com/security/cve/CVE-2018-20319"
},
{
"category": "external",
"summary": "SUSE Bug 1215669 for CVE-2018-20319",
"url": "https://bugzilla.suse.com/1215669"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.aarch64",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.s390x",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.aarch64",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.s390x",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-20319"
},
{
"cve": "CVE-2020-12105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12105"
}
],
"notes": [
{
"category": "general",
"text": "OpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.aarch64",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.s390x",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12105",
"url": "https://www.suse.com/security/cve/CVE-2020-12105"
},
{
"category": "external",
"summary": "SUSE Bug 1170452 for CVE-2020-12105",
"url": "https://bugzilla.suse.com/1170452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.aarch64",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.s390x",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.aarch64",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.s390x",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-12105"
},
{
"cve": "CVE-2020-12823",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12823"
}
],
"notes": [
{
"category": "general",
"text": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.aarch64",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.s390x",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12823",
"url": "https://www.suse.com/security/cve/CVE-2020-12823"
},
{
"category": "external",
"summary": "SUSE Bug 1171862 for CVE-2020-12823",
"url": "https://bugzilla.suse.com/1171862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.aarch64",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.s390x",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.aarch64",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.s390x",
"openSUSE Tumbleweed:libopenconnect5-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-bash-completion-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-devel-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-doc-8.10-2.6.x86_64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.aarch64",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.ppc64le",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.s390x",
"openSUSE Tumbleweed:openconnect-lang-8.10-2.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-12823"
}
]
}
suse-su-2020:1807-1
Vulnerability from csaf_suse
Published
2020-06-30 15:43
Modified
2020-06-30 15:43
Summary
Security update for openconnect
Notes
Title of the patch
Security update for openconnect
Description of the patch
This update for openconnect fixes the following issues:
- CVE-2020-12823: Fixed a buffer overflow via crafted certificate data which could have led to denial of service (bsc#1171862).
Patchnames
SUSE-2020-1807,SUSE-SLE-WE-12-SP4-2020-1807,SUSE-SLE-WE-12-SP5-2020-1807
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openconnect",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openconnect fixes the following issues:\n\t \n- CVE-2020-12823: Fixed a buffer overflow via crafted certificate data which could have led to denial of service (bsc#1171862).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2020-1807,SUSE-SLE-WE-12-SP4-2020-1807,SUSE-SLE-WE-12-SP5-2020-1807",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1807-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:1807-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201807-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:1807-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/007057.html"
},
{
"category": "self",
"summary": "SUSE Bug 1171862",
"url": "https://bugzilla.suse.com/1171862"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12823 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12823/"
}
],
"title": "Security update for openconnect",
"tracking": {
"current_release_date": "2020-06-30T15:43:59Z",
"generator": {
"date": "2020-06-30T15:43:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:1807-1",
"initial_release_date": "2020-06-30T15:43:59Z",
"revision_history": [
{
"date": "2020-06-30T15:43:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.12.1.aarch64",
"product": {
"name": "openconnect-7.08-3.12.1.aarch64",
"product_id": "openconnect-7.08-3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.12.1.aarch64",
"product": {
"name": "openconnect-devel-7.08-3.12.1.aarch64",
"product_id": "openconnect-devel-7.08-3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.12.1.aarch64",
"product": {
"name": "openconnect-doc-7.08-3.12.1.aarch64",
"product_id": "openconnect-doc-7.08-3.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.12.1.i586",
"product": {
"name": "openconnect-7.08-3.12.1.i586",
"product_id": "openconnect-7.08-3.12.1.i586"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.12.1.i586",
"product": {
"name": "openconnect-devel-7.08-3.12.1.i586",
"product_id": "openconnect-devel-7.08-3.12.1.i586"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.12.1.i586",
"product": {
"name": "openconnect-doc-7.08-3.12.1.i586",
"product_id": "openconnect-doc-7.08-3.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-lang-7.08-3.12.1.noarch",
"product": {
"name": "openconnect-lang-7.08-3.12.1.noarch",
"product_id": "openconnect-lang-7.08-3.12.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.12.1.ppc64le",
"product": {
"name": "openconnect-7.08-3.12.1.ppc64le",
"product_id": "openconnect-7.08-3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.12.1.ppc64le",
"product": {
"name": "openconnect-devel-7.08-3.12.1.ppc64le",
"product_id": "openconnect-devel-7.08-3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.12.1.ppc64le",
"product": {
"name": "openconnect-doc-7.08-3.12.1.ppc64le",
"product_id": "openconnect-doc-7.08-3.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.12.1.s390",
"product": {
"name": "openconnect-7.08-3.12.1.s390",
"product_id": "openconnect-7.08-3.12.1.s390"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.12.1.s390",
"product": {
"name": "openconnect-devel-7.08-3.12.1.s390",
"product_id": "openconnect-devel-7.08-3.12.1.s390"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.12.1.s390",
"product": {
"name": "openconnect-doc-7.08-3.12.1.s390",
"product_id": "openconnect-doc-7.08-3.12.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.12.1.s390x",
"product": {
"name": "openconnect-7.08-3.12.1.s390x",
"product_id": "openconnect-7.08-3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.12.1.s390x",
"product": {
"name": "openconnect-devel-7.08-3.12.1.s390x",
"product_id": "openconnect-devel-7.08-3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.12.1.s390x",
"product": {
"name": "openconnect-doc-7.08-3.12.1.s390x",
"product_id": "openconnect-doc-7.08-3.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-3.12.1.x86_64",
"product": {
"name": "openconnect-7.08-3.12.1.x86_64",
"product_id": "openconnect-7.08-3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-3.12.1.x86_64",
"product": {
"name": "openconnect-devel-7.08-3.12.1.x86_64",
"product_id": "openconnect-devel-7.08-3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-3.12.1.x86_64",
"product": {
"name": "openconnect-doc-7.08-3.12.1.x86_64",
"product_id": "openconnect-doc-7.08-3.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-7.08-3.12.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-7.08-3.12.1.x86_64"
},
"product_reference": "openconnect-7.08-3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-7.08-3.12.1.noarch as component of SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-lang-7.08-3.12.1.noarch"
},
"product_reference": "openconnect-lang-7.08-3.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-7.08-3.12.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-7.08-3.12.1.x86_64"
},
"product_reference": "openconnect-7.08-3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-7.08-3.12.1.noarch as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-lang-7.08-3.12.1.noarch"
},
"product_reference": "openconnect-lang-7.08-3.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12823",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12823"
}
],
"notes": [
{
"category": "general",
"text": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-7.08-3.12.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-lang-7.08-3.12.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-7.08-3.12.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-lang-7.08-3.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12823",
"url": "https://www.suse.com/security/cve/CVE-2020-12823"
},
{
"category": "external",
"summary": "SUSE Bug 1171862 for CVE-2020-12823",
"url": "https://bugzilla.suse.com/1171862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-7.08-3.12.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-lang-7.08-3.12.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-7.08-3.12.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-lang-7.08-3.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-7.08-3.12.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:openconnect-lang-7.08-3.12.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-7.08-3.12.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:openconnect-lang-7.08-3.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-06-30T15:43:59Z",
"details": "moderate"
}
],
"title": "CVE-2020-12823"
}
]
}
suse-su-2024:0317-1
Vulnerability from csaf_suse
Published
2024-02-02 09:35
Modified
2024-02-02 09:35
Summary
Security update for openconnect
Notes
Title of the patch
Security update for openconnect
Description of the patch
This update for openconnect fixes the following issues:
- Update to release 9.12:
* Explicitly reject overly long tun device names.
* Increase maximum input size from stdin (#579).
* Ignore 0.0.0.0 as NBNS address (!446, vpnc-scripts#58).
* Fix stray (null) in URL path after Pulse authentication (4023bd95).
* Fix config XML parsing mistake that left GlobalProtect ESP non-working in v9.10 (!475).
* Fix case sensitivity in GPST header matching (!474).
- Update to release 9.10:
* Fix external browser authentication with KDE plasma-nm < 5.26.
* Always redirect stdout to stderr when spawning external browser.
* Increase default queue length to 32 packets.
* Fix receiving multiple packets in one TLS frame, and single packets split across multiple TLS frames, for Array.
* Handle idiosyncratic variation in search domain separators for all protocols
* Support region selection field for Pulse authentication
* Support modified configuration packet from Pulse 9.1R16 servers
* Allow hidden form fields to be populated or converted to text fields on the command line
* Support yet another strange way of encoding challenge-based 2FA for GlobalProtect
* Add --sni option (and corresponding C and Java API functions) to allow domain-fronting connections in censored/filtered network environments
* Parrot a GlobalProtect server's software version, if present, as the client version (!333)
* Fix NULL pointer dereference that has left Android builds broken since v8.20 (!389).
* Fix Fortinet authentication bug where repeated SVPNCOOKIE causes segfaults (#514, !418).
* Support F5 VPNs which encode authentication forms only in JSON, not in HTML.
* Support simultaneous IPv6 and Legacy IP ('dual-stack') for Fortinet .
* Support 'FTM-push' token mode for Fortinet VPNs .
* Send IPv6-compatible version string in Pulse IF/T session establishment
* Add --no-external-auth option to not advertise external-browser authentication
* Many small improvements in server response parsing, and better logging messages and documentation.
- Update to release 9.01:
* Add support for AnyConnect 'Session Token Re-use Anchor Protocol' (STRAP)
* Add support for AnyConnect 'external browser' SSO mode
* Bugfix RSA SecurID token decryption and PIN entry forms, broken in v8.20
* Support Cisco's multiple-certificate authentication
* Revert GlobalProtect default route handling change from v8.20
* Suppo split-exclude routes for Fortinet
* Add webview callback and SAML/SSO support for AnyConnect, GlobalProtect
- Update to release 8.20:
* Support non-AEAD ciphersuites in DTLSv1.2 with AnyConnect.
* Emulated a newer version of GlobalProtect official clients,
5.1.5-8; was 4.0.2-19
* Support Juniper login forms containing both password and 2FA
token
* Explicitly disable 3DES and RC4, unless enabled with
--allow-insecure-crypto
* Allow protocols to delay tunnel setup and shutdown (!117)
* Support for GlobalProtect IPv6
* SIGUSR1now causes OpenConnect to log detailed connection
information and statistics
* Allow --servercert to be specified multiple times in order to
accept server certificates matching more than one possible
fingerprint
* Demangle default routes sent as split routes by GlobalProtect
* Support more Juniper login forms, including some SSO forms
* Restore compatibility with newer Cisco servers, by no longer
sending them the X-AnyConnect-Platform header
* Add support for PPP-based protocols, currently over TLS only.
* Add support for two PPP-based protocols, F5 with
--protocol=f5 and Fortinet with --protocol=fortinet.
* Add support for Array Networks SSL VPN.
* Support TLSv1.3 with TPMv2 EC and RSA keys, add test cases
for swtpm and hardware TPM.
- Import the latest version of the vpnc-script (bsc#1140772)
* This brings a lot of improvements for non-trivial network setups, IPv6 etc
- Build with --without-gnutls-version-check
- Update to version 8.10:
* Install bash completion script to
${datadir}/bash-completion/completions/openconnect.
* Improve compatibility of csd-post.sh trojan.
* Fix potential buffer overflow with GnuTLS describing local
certs (CVE-2020-12823, bsc#1171862,
gl#openconnect/openconnect!108).
- Introduce subpackage for bash-completion
- Update to 8.09:
* Add bash completion support.
* Give more helpful error in case of Pulse servers asking for
TNCC.
* Sanitize non-canonical Legacy IP network addresses.
* Fix OpenSSL validation for trusted but invalid certificates
(CVE-2020-12105 bsc#1170452).
* Convert tncc-wrapper.py to Python 3, and include modernized
tncc-emulate.py as well. (!91)
* Disable Nagle's algorithm for TLS sockets, to improve
interactivity when tunnel runs over TCP rather than UDP.
* GlobalProtect: more resilient handling of periodic HIP check
and login arguments, and predictable naming of challenge forms.
* Work around PKCS#11 tokens which forget to set
CKF_LOGIN_REQUIRED.
- Update to 8.0.8:
* Fix check of pin-sha256: public key hashes to be case sensitive
* Don't give non-functioning stderr to CSD trojan scripts.
* Fix crash with uninitialised OIDC token.
- Update to 8.0.7:
* Don't abort Pulse connection when server-provided certificate
MD5 doesn't match.
* Fix off-by-one in check for bad GnuTLS versions, and add build
and run time checks.
* Don't abort connection if CSD wrapper script returns non-zero
(for now).
* Make --passtos work for protocols that use ESP, in addition
to DTLS.
* Convert tncc-wrapper.py to Python 3, and include modernized
tncc-emulate.py as well.
- Remove tncc-wrapper.py script as it is python2 only bsc#1157446
- No need to ship hipreport-android.sh as it is intented for
android systems only
- Update to 8.0.5:
* Minor fixes to build on specific platforms
* Includes fix for a buffer overflow with chunked HTTP handling
(CVE-2019-16239, bsc#1151178)
- Use python3 to generate the web data as now it is supported
by upstream
- Update to 8.0.3:
* Fix Cisco DTLSv1.2 support for AES256-GCM-SHA384.
* Fix recognition of OTP password fields.
- Update to 8.02:
* Fix GNU/Hurd build.
* Discover vpnc-script in default packaged location on FreeBSD/OpenBSD.
* Support split-exclude routes for GlobalProtect.
* Fix GnuTLS builds without libtasn1.
* Fix DTLS support with OpenSSL 1.1.1+.
* Add Cisco-compatible DTLSv1.2 support.
* Invoke script with reason=attempt-reconnect before doing so.
- Update to 8.01:
* Clear form submissions (which may include passwords) before
freeing (CVE-2018-20319, bsc#1215669).
* Allow form responses to be provided on command line.
* Add support for SSL keys stored in TPM2.
* Fix ESP rekey when replay protection is disabled.
* Drop support for GnuTLS older than 3.2.10.
* Fix --passwd-on-stdin for Windows to not forcibly open console.
* Fix portability of shell scripts in test suite.
* Add Google Authenticator TOTP support for Juniper.
* Add RFC7469 key PIN support for cert hashes.
* Add protocol method to securely log out the Juniper session.
* Relax requirements for Juniper hostname packet response to support old gateways.
* Add API functions to query the supported protocols.
* Verify ESP sequence numbers and warn even if replay protection is disabled.
* Add support for PAN GlobalProtect VPN protocol (--protocol=gp).
* Reorganize listing of command-line options, and include information on supported protocols.
* SIGTERM cleans up the session similarly to SIGINT.
* Fix memset_s() arguments.
* Fix OpenBSD build.
- Explicitely enable all the features as needed to stop build if
something is missing
Patchnames
SUSE-2024-317,SUSE-SLE-Module-Basesystem-15-SP5-2024-317,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-317,SUSE-SLE-Product-WE-15-SP5-2024-317,openSUSE-SLE-15.5-2024-317
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openconnect",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openconnect fixes the following issues:\n\n- Update to release 9.12:\n\n * Explicitly reject overly long tun device names.\n * Increase maximum input size from stdin (#579).\n * Ignore 0.0.0.0 as NBNS address (!446, vpnc-scripts#58).\n * Fix stray (null) in URL path after Pulse authentication (4023bd95).\n * Fix config XML parsing mistake that left GlobalProtect ESP non-working in v9.10 (!475).\n * Fix case sensitivity in GPST header matching (!474).\n\n- Update to release 9.10:\n\n * Fix external browser authentication with KDE plasma-nm \u003c 5.26.\n * Always redirect stdout to stderr when spawning external browser.\n * Increase default queue length to 32 packets.\n * Fix receiving multiple packets in one TLS frame, and single packets split across multiple TLS frames, for Array.\n * Handle idiosyncratic variation in search domain separators for all protocols\n * Support region selection field for Pulse authentication \n * Support modified configuration packet from Pulse 9.1R16 servers \n * Allow hidden form fields to be populated or converted to text fields on the command line\n * Support yet another strange way of encoding challenge-based 2FA for GlobalProtect\n * Add --sni option (and corresponding C and Java API functions) to allow domain-fronting connections in censored/filtered network environments\n * Parrot a GlobalProtect server\u0027s software version, if present, as the client version (!333)\n * Fix NULL pointer dereference that has left Android builds broken since v8.20 (!389).\n * Fix Fortinet authentication bug where repeated SVPNCOOKIE causes segfaults (#514, !418).\n * Support F5 VPNs which encode authentication forms only in JSON, not in HTML.\n * Support simultaneous IPv6 and Legacy IP (\u0027dual-stack\u0027) for Fortinet .\n * Support \u0027FTM-push\u0027 token mode for Fortinet VPNs .\n * Send IPv6-compatible version string in Pulse IF/T session establishment\n * Add --no-external-auth option to not advertise external-browser authentication\n * Many small improvements in server response parsing, and better logging messages and documentation.\n\n- Update to release 9.01:\n\n * Add support for AnyConnect \u0027Session Token Re-use Anchor Protocol\u0027 (STRAP) \n * Add support for AnyConnect \u0027external browser\u0027 SSO mode\n * Bugfix RSA SecurID token decryption and PIN entry forms, broken in v8.20\n * Support Cisco\u0027s multiple-certificate authentication\n * Revert GlobalProtect default route handling change from v8.20\n * Suppo split-exclude routes for Fortinet\n * Add webview callback and SAML/SSO support for AnyConnect, GlobalProtect\n\n- Update to release 8.20:\n\n * Support non-AEAD ciphersuites in DTLSv1.2 with AnyConnect.\n * Emulated a newer version of GlobalProtect official clients,\n 5.1.5-8; was 4.0.2-19\n * Support Juniper login forms containing both password and 2FA\n token\n * Explicitly disable 3DES and RC4, unless enabled with\n --allow-insecure-crypto\n * Allow protocols to delay tunnel setup and shutdown (!117)\n * Support for GlobalProtect IPv6\n * SIGUSR1now causes OpenConnect to log detailed connection\n information and statistics\n * Allow --servercert to be specified multiple times in order to\n accept server certificates matching more than one possible\n fingerprint\n * Demangle default routes sent as split routes by GlobalProtect\n * Support more Juniper login forms, including some SSO forms\n * Restore compatibility with newer Cisco servers, by no longer\n sending them the X-AnyConnect-Platform header\n * Add support for PPP-based protocols, currently over TLS only.\n * Add support for two PPP-based protocols, F5 with\n --protocol=f5 and Fortinet with --protocol=fortinet.\n * Add support for Array Networks SSL VPN.\n * Support TLSv1.3 with TPMv2 EC and RSA keys, add test cases\n for swtpm and hardware TPM.\n\n- Import the latest version of the vpnc-script (bsc#1140772)\n\n * This brings a lot of improvements for non-trivial network setups, IPv6 etc\n\n- Build with --without-gnutls-version-check\n\n- Update to version 8.10:\n\n * Install bash completion script to\n ${datadir}/bash-completion/completions/openconnect.\n * Improve compatibility of csd-post.sh trojan.\n * Fix potential buffer overflow with GnuTLS describing local\n certs (CVE-2020-12823, bsc#1171862,\n gl#openconnect/openconnect!108).\n\n- Introduce subpackage for bash-completion\n\n- Update to 8.09:\n\n * Add bash completion support.\n * Give more helpful error in case of Pulse servers asking for\n TNCC.\n * Sanitize non-canonical Legacy IP network addresses.\n * Fix OpenSSL validation for trusted but invalid certificates\n (CVE-2020-12105 bsc#1170452).\n * Convert tncc-wrapper.py to Python 3, and include modernized\n tncc-emulate.py as well. (!91)\n * Disable Nagle\u0027s algorithm for TLS sockets, to improve\n interactivity when tunnel runs over TCP rather than UDP.\n * GlobalProtect: more resilient handling of periodic HIP check\n and login arguments, and predictable naming of challenge forms.\n * Work around PKCS#11 tokens which forget to set\n CKF_LOGIN_REQUIRED.\n\n- Update to 8.0.8:\n\n * Fix check of pin-sha256: public key hashes to be case sensitive\n * Don\u0027t give non-functioning stderr to CSD trojan scripts.\n * Fix crash with uninitialised OIDC token.\n\n- Update to 8.0.7:\n\n * Don\u0027t abort Pulse connection when server-provided certificate\n MD5 doesn\u0027t match.\n * Fix off-by-one in check for bad GnuTLS versions, and add build\n and run time checks.\n * Don\u0027t abort connection if CSD wrapper script returns non-zero\n (for now).\n * Make --passtos work for protocols that use ESP, in addition\n to DTLS.\n * Convert tncc-wrapper.py to Python 3, and include modernized\n tncc-emulate.py as well.\n\n- Remove tncc-wrapper.py script as it is python2 only bsc#1157446\n\n- No need to ship hipreport-android.sh as it is intented for\n android systems only\n\n- Update to 8.0.5:\n\n * Minor fixes to build on specific platforms\n * Includes fix for a buffer overflow with chunked HTTP handling\n (CVE-2019-16239, bsc#1151178) \n\n- Use python3 to generate the web data as now it is supported\n by upstream\n\n- Update to 8.0.3:\n\n * Fix Cisco DTLSv1.2 support for AES256-GCM-SHA384.\n * Fix recognition of OTP password fields.\n\n- Update to 8.02:\n\n * Fix GNU/Hurd build.\n * Discover vpnc-script in default packaged location on FreeBSD/OpenBSD.\n * Support split-exclude routes for GlobalProtect.\n * Fix GnuTLS builds without libtasn1.\n * Fix DTLS support with OpenSSL 1.1.1+.\n * Add Cisco-compatible DTLSv1.2 support.\n * Invoke script with reason=attempt-reconnect before doing so.\n \n\n- Update to 8.01:\n\n * Clear form submissions (which may include passwords) before\n freeing (CVE-2018-20319, bsc#1215669).\n * Allow form responses to be provided on command line.\n * Add support for SSL keys stored in TPM2.\n * Fix ESP rekey when replay protection is disabled.\n * Drop support for GnuTLS older than 3.2.10.\n * Fix --passwd-on-stdin for Windows to not forcibly open console.\n * Fix portability of shell scripts in test suite.\n * Add Google Authenticator TOTP support for Juniper.\n * Add RFC7469 key PIN support for cert hashes.\n * Add protocol method to securely log out the Juniper session.\n * Relax requirements for Juniper hostname packet response to support old gateways.\n * Add API functions to query the supported protocols.\n * Verify ESP sequence numbers and warn even if replay protection is disabled.\n * Add support for PAN GlobalProtect VPN protocol (--protocol=gp).\n * Reorganize listing of command-line options, and include information on supported protocols.\n * SIGTERM cleans up the session similarly to SIGINT.\n * Fix memset_s() arguments.\n * Fix OpenBSD build.\n\n- Explicitely enable all the features as needed to stop build if\n something is missing\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-317,SUSE-SLE-Module-Basesystem-15-SP5-2024-317,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-317,SUSE-SLE-Product-WE-15-SP5-2024-317,openSUSE-SLE-15.5-2024-317",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0317-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0317-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240317-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0317-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017849.html"
},
{
"category": "self",
"summary": "SUSE Bug 1140772",
"url": "https://bugzilla.suse.com/1140772"
},
{
"category": "self",
"summary": "SUSE Bug 1157446",
"url": "https://bugzilla.suse.com/1157446"
},
{
"category": "self",
"summary": "SUSE Bug 1170452",
"url": "https://bugzilla.suse.com/1170452"
},
{
"category": "self",
"summary": "SUSE Bug 1171862",
"url": "https://bugzilla.suse.com/1171862"
},
{
"category": "self",
"summary": "SUSE Bug 1215669",
"url": "https://bugzilla.suse.com/1215669"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20319 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12105 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12823 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12823/"
}
],
"title": "Security update for openconnect",
"tracking": {
"current_release_date": "2024-02-02T09:35:06Z",
"generator": {
"date": "2024-02-02T09:35:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0317-1",
"initial_release_date": "2024-02-02T09:35:06Z",
"revision_history": [
{
"date": "2024-02-02T09:35:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "liboath-devel-2.6.2-150000.3.5.1.aarch64",
"product": {
"name": "liboath-devel-2.6.2-150000.3.5.1.aarch64",
"product_id": "liboath-devel-2.6.2-150000.3.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "liboath0-2.6.2-150000.3.5.1.aarch64",
"product": {
"name": "liboath0-2.6.2-150000.3.5.1.aarch64",
"product_id": "liboath0-2.6.2-150000.3.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenconnect5-9.12-150400.15.3.1.aarch64",
"product": {
"name": "libopenconnect5-9.12-150400.15.3.1.aarch64",
"product_id": "libopenconnect5-9.12-150400.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"product": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"product_id": "libpskc-devel-2.6.2-150000.3.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpskc0-2.6.2-150000.3.5.1.aarch64",
"product": {
"name": "libpskc0-2.6.2-150000.3.5.1.aarch64",
"product_id": "libpskc0-2.6.2-150000.3.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libstoken1-0.81-150400.13.2.1.aarch64",
"product": {
"name": "libstoken1-0.81-150400.13.2.1.aarch64",
"product_id": "libstoken1-0.81-150400.13.2.1.aarch64"
}
},
{
"category": "product_version",
"name": "oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"product": {
"name": "oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"product_id": "oath-toolkit-2.6.2-150000.3.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-9.12-150400.15.3.1.aarch64",
"product": {
"name": "openconnect-9.12-150400.15.3.1.aarch64",
"product_id": "openconnect-9.12-150400.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-9.12-150400.15.3.1.aarch64",
"product": {
"name": "openconnect-devel-9.12-150400.15.3.1.aarch64",
"product_id": "openconnect-devel-9.12-150400.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "pam_oath-2.6.2-150000.3.5.1.aarch64",
"product": {
"name": "pam_oath-2.6.2-150000.3.5.1.aarch64",
"product_id": "pam_oath-2.6.2-150000.3.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "stoken-0.81-150400.13.2.1.aarch64",
"product": {
"name": "stoken-0.81-150400.13.2.1.aarch64",
"product_id": "stoken-0.81-150400.13.2.1.aarch64"
}
},
{
"category": "product_version",
"name": "stoken-devel-0.81-150400.13.2.1.aarch64",
"product": {
"name": "stoken-devel-0.81-150400.13.2.1.aarch64",
"product_id": "stoken-devel-0.81-150400.13.2.1.aarch64"
}
},
{
"category": "product_version",
"name": "stoken-gui-0.81-150400.13.2.1.aarch64",
"product": {
"name": "stoken-gui-0.81-150400.13.2.1.aarch64",
"product_id": "stoken-gui-0.81-150400.13.2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "liboath-devel-2.6.2-150000.3.5.1.i586",
"product": {
"name": "liboath-devel-2.6.2-150000.3.5.1.i586",
"product_id": "liboath-devel-2.6.2-150000.3.5.1.i586"
}
},
{
"category": "product_version",
"name": "liboath0-2.6.2-150000.3.5.1.i586",
"product": {
"name": "liboath0-2.6.2-150000.3.5.1.i586",
"product_id": "liboath0-2.6.2-150000.3.5.1.i586"
}
},
{
"category": "product_version",
"name": "libopenconnect5-9.12-150400.15.3.1.i586",
"product": {
"name": "libopenconnect5-9.12-150400.15.3.1.i586",
"product_id": "libopenconnect5-9.12-150400.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "libpskc-devel-2.6.2-150000.3.5.1.i586",
"product": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.i586",
"product_id": "libpskc-devel-2.6.2-150000.3.5.1.i586"
}
},
{
"category": "product_version",
"name": "libpskc0-2.6.2-150000.3.5.1.i586",
"product": {
"name": "libpskc0-2.6.2-150000.3.5.1.i586",
"product_id": "libpskc0-2.6.2-150000.3.5.1.i586"
}
},
{
"category": "product_version",
"name": "libstoken1-0.81-150400.13.2.1.i586",
"product": {
"name": "libstoken1-0.81-150400.13.2.1.i586",
"product_id": "libstoken1-0.81-150400.13.2.1.i586"
}
},
{
"category": "product_version",
"name": "oath-toolkit-2.6.2-150000.3.5.1.i586",
"product": {
"name": "oath-toolkit-2.6.2-150000.3.5.1.i586",
"product_id": "oath-toolkit-2.6.2-150000.3.5.1.i586"
}
},
{
"category": "product_version",
"name": "openconnect-9.12-150400.15.3.1.i586",
"product": {
"name": "openconnect-9.12-150400.15.3.1.i586",
"product_id": "openconnect-9.12-150400.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "openconnect-devel-9.12-150400.15.3.1.i586",
"product": {
"name": "openconnect-devel-9.12-150400.15.3.1.i586",
"product_id": "openconnect-devel-9.12-150400.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "pam_oath-2.6.2-150000.3.5.1.i586",
"product": {
"name": "pam_oath-2.6.2-150000.3.5.1.i586",
"product_id": "pam_oath-2.6.2-150000.3.5.1.i586"
}
},
{
"category": "product_version",
"name": "stoken-0.81-150400.13.2.1.i586",
"product": {
"name": "stoken-0.81-150400.13.2.1.i586",
"product_id": "stoken-0.81-150400.13.2.1.i586"
}
},
{
"category": "product_version",
"name": "stoken-devel-0.81-150400.13.2.1.i586",
"product": {
"name": "stoken-devel-0.81-150400.13.2.1.i586",
"product_id": "stoken-devel-0.81-150400.13.2.1.i586"
}
},
{
"category": "product_version",
"name": "stoken-gui-0.81-150400.13.2.1.i586",
"product": {
"name": "stoken-gui-0.81-150400.13.2.1.i586",
"product_id": "stoken-gui-0.81-150400.13.2.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"product": {
"name": "oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"product_id": "oath-toolkit-xml-2.6.2-150000.3.5.1.noarch"
}
},
{
"category": "product_version",
"name": "openconnect-bash-completion-9.12-150400.15.3.1.noarch",
"product": {
"name": "openconnect-bash-completion-9.12-150400.15.3.1.noarch",
"product_id": "openconnect-bash-completion-9.12-150400.15.3.1.noarch"
}
},
{
"category": "product_version",
"name": "openconnect-doc-9.12-150400.15.3.1.noarch",
"product": {
"name": "openconnect-doc-9.12-150400.15.3.1.noarch",
"product_id": "openconnect-doc-9.12-150400.15.3.1.noarch"
}
},
{
"category": "product_version",
"name": "openconnect-lang-9.12-150400.15.3.1.noarch",
"product": {
"name": "openconnect-lang-9.12-150400.15.3.1.noarch",
"product_id": "openconnect-lang-9.12-150400.15.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"product": {
"name": "liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"product_id": "liboath-devel-2.6.2-150000.3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "liboath0-2.6.2-150000.3.5.1.ppc64le",
"product": {
"name": "liboath0-2.6.2-150000.3.5.1.ppc64le",
"product_id": "liboath0-2.6.2-150000.3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenconnect5-9.12-150400.15.3.1.ppc64le",
"product": {
"name": "libopenconnect5-9.12-150400.15.3.1.ppc64le",
"product_id": "libopenconnect5-9.12-150400.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"product": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"product_id": "libpskc-devel-2.6.2-150000.3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpskc0-2.6.2-150000.3.5.1.ppc64le",
"product": {
"name": "libpskc0-2.6.2-150000.3.5.1.ppc64le",
"product_id": "libpskc0-2.6.2-150000.3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libstoken1-0.81-150400.13.2.1.ppc64le",
"product": {
"name": "libstoken1-0.81-150400.13.2.1.ppc64le",
"product_id": "libstoken1-0.81-150400.13.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"product": {
"name": "oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"product_id": "oath-toolkit-2.6.2-150000.3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-9.12-150400.15.3.1.ppc64le",
"product": {
"name": "openconnect-9.12-150400.15.3.1.ppc64le",
"product_id": "openconnect-9.12-150400.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-devel-9.12-150400.15.3.1.ppc64le",
"product": {
"name": "openconnect-devel-9.12-150400.15.3.1.ppc64le",
"product_id": "openconnect-devel-9.12-150400.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pam_oath-2.6.2-150000.3.5.1.ppc64le",
"product": {
"name": "pam_oath-2.6.2-150000.3.5.1.ppc64le",
"product_id": "pam_oath-2.6.2-150000.3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "stoken-0.81-150400.13.2.1.ppc64le",
"product": {
"name": "stoken-0.81-150400.13.2.1.ppc64le",
"product_id": "stoken-0.81-150400.13.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "stoken-devel-0.81-150400.13.2.1.ppc64le",
"product": {
"name": "stoken-devel-0.81-150400.13.2.1.ppc64le",
"product_id": "stoken-devel-0.81-150400.13.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "stoken-gui-0.81-150400.13.2.1.ppc64le",
"product": {
"name": "stoken-gui-0.81-150400.13.2.1.ppc64le",
"product_id": "stoken-gui-0.81-150400.13.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "liboath-devel-2.6.2-150000.3.5.1.s390x",
"product": {
"name": "liboath-devel-2.6.2-150000.3.5.1.s390x",
"product_id": "liboath-devel-2.6.2-150000.3.5.1.s390x"
}
},
{
"category": "product_version",
"name": "liboath0-2.6.2-150000.3.5.1.s390x",
"product": {
"name": "liboath0-2.6.2-150000.3.5.1.s390x",
"product_id": "liboath0-2.6.2-150000.3.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenconnect5-9.12-150400.15.3.1.s390x",
"product": {
"name": "libopenconnect5-9.12-150400.15.3.1.s390x",
"product_id": "libopenconnect5-9.12-150400.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libpskc-devel-2.6.2-150000.3.5.1.s390x",
"product": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.s390x",
"product_id": "libpskc-devel-2.6.2-150000.3.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libpskc0-2.6.2-150000.3.5.1.s390x",
"product": {
"name": "libpskc0-2.6.2-150000.3.5.1.s390x",
"product_id": "libpskc0-2.6.2-150000.3.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libstoken1-0.81-150400.13.2.1.s390x",
"product": {
"name": "libstoken1-0.81-150400.13.2.1.s390x",
"product_id": "libstoken1-0.81-150400.13.2.1.s390x"
}
},
{
"category": "product_version",
"name": "oath-toolkit-2.6.2-150000.3.5.1.s390x",
"product": {
"name": "oath-toolkit-2.6.2-150000.3.5.1.s390x",
"product_id": "oath-toolkit-2.6.2-150000.3.5.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-9.12-150400.15.3.1.s390x",
"product": {
"name": "openconnect-9.12-150400.15.3.1.s390x",
"product_id": "openconnect-9.12-150400.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-devel-9.12-150400.15.3.1.s390x",
"product": {
"name": "openconnect-devel-9.12-150400.15.3.1.s390x",
"product_id": "openconnect-devel-9.12-150400.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "pam_oath-2.6.2-150000.3.5.1.s390x",
"product": {
"name": "pam_oath-2.6.2-150000.3.5.1.s390x",
"product_id": "pam_oath-2.6.2-150000.3.5.1.s390x"
}
},
{
"category": "product_version",
"name": "stoken-0.81-150400.13.2.1.s390x",
"product": {
"name": "stoken-0.81-150400.13.2.1.s390x",
"product_id": "stoken-0.81-150400.13.2.1.s390x"
}
},
{
"category": "product_version",
"name": "stoken-devel-0.81-150400.13.2.1.s390x",
"product": {
"name": "stoken-devel-0.81-150400.13.2.1.s390x",
"product_id": "stoken-devel-0.81-150400.13.2.1.s390x"
}
},
{
"category": "product_version",
"name": "stoken-gui-0.81-150400.13.2.1.s390x",
"product": {
"name": "stoken-gui-0.81-150400.13.2.1.s390x",
"product_id": "stoken-gui-0.81-150400.13.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "liboath-devel-2.6.2-150000.3.5.1.x86_64",
"product": {
"name": "liboath-devel-2.6.2-150000.3.5.1.x86_64",
"product_id": "liboath-devel-2.6.2-150000.3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "liboath0-2.6.2-150000.3.5.1.x86_64",
"product": {
"name": "liboath0-2.6.2-150000.3.5.1.x86_64",
"product_id": "liboath0-2.6.2-150000.3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenconnect5-9.12-150400.15.3.1.x86_64",
"product": {
"name": "libopenconnect5-9.12-150400.15.3.1.x86_64",
"product_id": "libopenconnect5-9.12-150400.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"product": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"product_id": "libpskc-devel-2.6.2-150000.3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpskc0-2.6.2-150000.3.5.1.x86_64",
"product": {
"name": "libpskc0-2.6.2-150000.3.5.1.x86_64",
"product_id": "libpskc0-2.6.2-150000.3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libstoken1-0.81-150400.13.2.1.x86_64",
"product": {
"name": "libstoken1-0.81-150400.13.2.1.x86_64",
"product_id": "libstoken1-0.81-150400.13.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"product": {
"name": "oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"product_id": "oath-toolkit-2.6.2-150000.3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-9.12-150400.15.3.1.x86_64",
"product": {
"name": "openconnect-9.12-150400.15.3.1.x86_64",
"product_id": "openconnect-9.12-150400.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-9.12-150400.15.3.1.x86_64",
"product": {
"name": "openconnect-devel-9.12-150400.15.3.1.x86_64",
"product_id": "openconnect-devel-9.12-150400.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "pam_oath-2.6.2-150000.3.5.1.x86_64",
"product": {
"name": "pam_oath-2.6.2-150000.3.5.1.x86_64",
"product_id": "pam_oath-2.6.2-150000.3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "stoken-0.81-150400.13.2.1.x86_64",
"product": {
"name": "stoken-0.81-150400.13.2.1.x86_64",
"product_id": "stoken-0.81-150400.13.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "stoken-devel-0.81-150400.13.2.1.x86_64",
"product": {
"name": "stoken-devel-0.81-150400.13.2.1.x86_64",
"product_id": "stoken-devel-0.81-150400.13.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "stoken-gui-0.81-150400.13.2.1.x86_64",
"product": {
"name": "stoken-gui-0.81-150400.13.2.1.x86_64",
"product_id": "stoken-gui-0.81-150400.13.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath-devel-2.6.2-150000.3.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.aarch64"
},
"product_reference": "liboath-devel-2.6.2-150000.3.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath-devel-2.6.2-150000.3.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.ppc64le"
},
"product_reference": "liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath-devel-2.6.2-150000.3.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.s390x"
},
"product_reference": "liboath-devel-2.6.2-150000.3.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath-devel-2.6.2-150000.3.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.x86_64"
},
"product_reference": "liboath-devel-2.6.2-150000.3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath0-2.6.2-150000.3.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.aarch64"
},
"product_reference": "liboath0-2.6.2-150000.3.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath0-2.6.2-150000.3.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.ppc64le"
},
"product_reference": "liboath0-2.6.2-150000.3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath0-2.6.2-150000.3.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.s390x"
},
"product_reference": "liboath0-2.6.2-150000.3.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath0-2.6.2-150000.3.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.x86_64"
},
"product_reference": "liboath0-2.6.2-150000.3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oath-toolkit-xml-2.6.2-150000.3.5.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch"
},
"product_reference": "oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-9.12-150400.15.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.aarch64"
},
"product_reference": "libopenconnect5-9.12-150400.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-9.12-150400.15.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.ppc64le"
},
"product_reference": "libopenconnect5-9.12-150400.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-9.12-150400.15.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.s390x"
},
"product_reference": "libopenconnect5-9.12-150400.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-9.12-150400.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64"
},
"product_reference": "libopenconnect5-9.12-150400.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.aarch64"
},
"product_reference": "libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le"
},
"product_reference": "libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.s390x"
},
"product_reference": "libpskc-devel-2.6.2-150000.3.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64"
},
"product_reference": "libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc0-2.6.2-150000.3.5.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.aarch64"
},
"product_reference": "libpskc0-2.6.2-150000.3.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc0-2.6.2-150000.3.5.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.ppc64le"
},
"product_reference": "libpskc0-2.6.2-150000.3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc0-2.6.2-150000.3.5.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.s390x"
},
"product_reference": "libpskc0-2.6.2-150000.3.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc0-2.6.2-150000.3.5.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64"
},
"product_reference": "libpskc0-2.6.2-150000.3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstoken1-0.81-150400.13.2.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.aarch64"
},
"product_reference": "libstoken1-0.81-150400.13.2.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstoken1-0.81-150400.13.2.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.ppc64le"
},
"product_reference": "libstoken1-0.81-150400.13.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstoken1-0.81-150400.13.2.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.s390x"
},
"product_reference": "libstoken1-0.81-150400.13.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstoken1-0.81-150400.13.2.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64"
},
"product_reference": "libstoken1-0.81-150400.13.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oath-toolkit-2.6.2-150000.3.5.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.aarch64"
},
"product_reference": "oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oath-toolkit-2.6.2-150000.3.5.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le"
},
"product_reference": "oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oath-toolkit-2.6.2-150000.3.5.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.s390x"
},
"product_reference": "oath-toolkit-2.6.2-150000.3.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oath-toolkit-2.6.2-150000.3.5.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.x86_64"
},
"product_reference": "oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-9.12-150400.15.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.aarch64"
},
"product_reference": "openconnect-9.12-150400.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-9.12-150400.15.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.ppc64le"
},
"product_reference": "openconnect-9.12-150400.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-9.12-150400.15.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.s390x"
},
"product_reference": "openconnect-9.12-150400.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-9.12-150400.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.x86_64"
},
"product_reference": "openconnect-9.12-150400.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-9.12-150400.15.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.aarch64"
},
"product_reference": "openconnect-devel-9.12-150400.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-9.12-150400.15.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.ppc64le"
},
"product_reference": "openconnect-devel-9.12-150400.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-9.12-150400.15.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.s390x"
},
"product_reference": "openconnect-devel-9.12-150400.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-9.12-150400.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64"
},
"product_reference": "openconnect-devel-9.12-150400.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-9.12-150400.15.3.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-doc-9.12-150400.15.3.1.noarch"
},
"product_reference": "openconnect-doc-9.12-150400.15.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-9.12-150400.15.3.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch"
},
"product_reference": "openconnect-lang-9.12-150400.15.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-0.81-150400.13.2.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.aarch64"
},
"product_reference": "stoken-0.81-150400.13.2.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-0.81-150400.13.2.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.ppc64le"
},
"product_reference": "stoken-0.81-150400.13.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-0.81-150400.13.2.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.s390x"
},
"product_reference": "stoken-0.81-150400.13.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-0.81-150400.13.2.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.x86_64"
},
"product_reference": "stoken-0.81-150400.13.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-devel-0.81-150400.13.2.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.aarch64"
},
"product_reference": "stoken-devel-0.81-150400.13.2.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-devel-0.81-150400.13.2.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.ppc64le"
},
"product_reference": "stoken-devel-0.81-150400.13.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-devel-0.81-150400.13.2.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.s390x"
},
"product_reference": "stoken-devel-0.81-150400.13.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-devel-0.81-150400.13.2.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64"
},
"product_reference": "stoken-devel-0.81-150400.13.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-gui-0.81-150400.13.2.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.aarch64"
},
"product_reference": "stoken-gui-0.81-150400.13.2.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-gui-0.81-150400.13.2.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.ppc64le"
},
"product_reference": "stoken-gui-0.81-150400.13.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-gui-0.81-150400.13.2.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.s390x"
},
"product_reference": "stoken-gui-0.81-150400.13.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-gui-0.81-150400.13.2.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.x86_64"
},
"product_reference": "stoken-gui-0.81-150400.13.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-9.12-150400.15.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64"
},
"product_reference": "libopenconnect5-9.12-150400.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64"
},
"product_reference": "libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc0-2.6.2-150000.3.5.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64"
},
"product_reference": "libpskc0-2.6.2-150000.3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstoken1-0.81-150400.13.2.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64"
},
"product_reference": "libstoken1-0.81-150400.13.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-9.12-150400.15.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-9.12-150400.15.3.1.x86_64"
},
"product_reference": "openconnect-9.12-150400.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-9.12-150400.15.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64"
},
"product_reference": "openconnect-devel-9.12-150400.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-9.12-150400.15.3.1.noarch as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch"
},
"product_reference": "openconnect-lang-9.12-150400.15.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-devel-0.81-150400.13.2.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64"
},
"product_reference": "stoken-devel-0.81-150400.13.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath-devel-2.6.2-150000.3.5.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.aarch64"
},
"product_reference": "liboath-devel-2.6.2-150000.3.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath-devel-2.6.2-150000.3.5.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.ppc64le"
},
"product_reference": "liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath-devel-2.6.2-150000.3.5.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.s390x"
},
"product_reference": "liboath-devel-2.6.2-150000.3.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath-devel-2.6.2-150000.3.5.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.x86_64"
},
"product_reference": "liboath-devel-2.6.2-150000.3.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath0-2.6.2-150000.3.5.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.aarch64"
},
"product_reference": "liboath0-2.6.2-150000.3.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath0-2.6.2-150000.3.5.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.ppc64le"
},
"product_reference": "liboath0-2.6.2-150000.3.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath0-2.6.2-150000.3.5.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.s390x"
},
"product_reference": "liboath0-2.6.2-150000.3.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liboath0-2.6.2-150000.3.5.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.x86_64"
},
"product_reference": "liboath0-2.6.2-150000.3.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-9.12-150400.15.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.aarch64"
},
"product_reference": "libopenconnect5-9.12-150400.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-9.12-150400.15.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.ppc64le"
},
"product_reference": "libopenconnect5-9.12-150400.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-9.12-150400.15.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.s390x"
},
"product_reference": "libopenconnect5-9.12-150400.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenconnect5-9.12-150400.15.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.x86_64"
},
"product_reference": "libopenconnect5-9.12-150400.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.aarch64"
},
"product_reference": "libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le"
},
"product_reference": "libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.s390x"
},
"product_reference": "libpskc-devel-2.6.2-150000.3.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc-devel-2.6.2-150000.3.5.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.x86_64"
},
"product_reference": "libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc0-2.6.2-150000.3.5.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.aarch64"
},
"product_reference": "libpskc0-2.6.2-150000.3.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc0-2.6.2-150000.3.5.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.ppc64le"
},
"product_reference": "libpskc0-2.6.2-150000.3.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc0-2.6.2-150000.3.5.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.s390x"
},
"product_reference": "libpskc0-2.6.2-150000.3.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpskc0-2.6.2-150000.3.5.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.x86_64"
},
"product_reference": "libpskc0-2.6.2-150000.3.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstoken1-0.81-150400.13.2.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.aarch64"
},
"product_reference": "libstoken1-0.81-150400.13.2.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstoken1-0.81-150400.13.2.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.ppc64le"
},
"product_reference": "libstoken1-0.81-150400.13.2.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstoken1-0.81-150400.13.2.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.s390x"
},
"product_reference": "libstoken1-0.81-150400.13.2.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstoken1-0.81-150400.13.2.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.x86_64"
},
"product_reference": "libstoken1-0.81-150400.13.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oath-toolkit-2.6.2-150000.3.5.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.aarch64"
},
"product_reference": "oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oath-toolkit-2.6.2-150000.3.5.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le"
},
"product_reference": "oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oath-toolkit-2.6.2-150000.3.5.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.s390x"
},
"product_reference": "oath-toolkit-2.6.2-150000.3.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oath-toolkit-2.6.2-150000.3.5.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.x86_64"
},
"product_reference": "oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oath-toolkit-xml-2.6.2-150000.3.5.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch"
},
"product_reference": "oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-9.12-150400.15.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.aarch64"
},
"product_reference": "openconnect-9.12-150400.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-9.12-150400.15.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.ppc64le"
},
"product_reference": "openconnect-9.12-150400.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-9.12-150400.15.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.s390x"
},
"product_reference": "openconnect-9.12-150400.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-9.12-150400.15.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.x86_64"
},
"product_reference": "openconnect-9.12-150400.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-9.12-150400.15.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.aarch64"
},
"product_reference": "openconnect-devel-9.12-150400.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-9.12-150400.15.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.ppc64le"
},
"product_reference": "openconnect-devel-9.12-150400.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-9.12-150400.15.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.s390x"
},
"product_reference": "openconnect-devel-9.12-150400.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-9.12-150400.15.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.x86_64"
},
"product_reference": "openconnect-devel-9.12-150400.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-doc-9.12-150400.15.3.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openconnect-doc-9.12-150400.15.3.1.noarch"
},
"product_reference": "openconnect-doc-9.12-150400.15.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-9.12-150400.15.3.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openconnect-lang-9.12-150400.15.3.1.noarch"
},
"product_reference": "openconnect-lang-9.12-150400.15.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_oath-2.6.2-150000.3.5.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.aarch64"
},
"product_reference": "pam_oath-2.6.2-150000.3.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_oath-2.6.2-150000.3.5.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.ppc64le"
},
"product_reference": "pam_oath-2.6.2-150000.3.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_oath-2.6.2-150000.3.5.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.s390x"
},
"product_reference": "pam_oath-2.6.2-150000.3.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_oath-2.6.2-150000.3.5.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.x86_64"
},
"product_reference": "pam_oath-2.6.2-150000.3.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-0.81-150400.13.2.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.aarch64"
},
"product_reference": "stoken-0.81-150400.13.2.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-0.81-150400.13.2.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.ppc64le"
},
"product_reference": "stoken-0.81-150400.13.2.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-0.81-150400.13.2.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.s390x"
},
"product_reference": "stoken-0.81-150400.13.2.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-0.81-150400.13.2.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.x86_64"
},
"product_reference": "stoken-0.81-150400.13.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-devel-0.81-150400.13.2.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.aarch64"
},
"product_reference": "stoken-devel-0.81-150400.13.2.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-devel-0.81-150400.13.2.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.ppc64le"
},
"product_reference": "stoken-devel-0.81-150400.13.2.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-devel-0.81-150400.13.2.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.s390x"
},
"product_reference": "stoken-devel-0.81-150400.13.2.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-devel-0.81-150400.13.2.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.x86_64"
},
"product_reference": "stoken-devel-0.81-150400.13.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-gui-0.81-150400.13.2.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.aarch64"
},
"product_reference": "stoken-gui-0.81-150400.13.2.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-gui-0.81-150400.13.2.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.ppc64le"
},
"product_reference": "stoken-gui-0.81-150400.13.2.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-gui-0.81-150400.13.2.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.s390x"
},
"product_reference": "stoken-gui-0.81-150400.13.2.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stoken-gui-0.81-150400.13.2.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.x86_64"
},
"product_reference": "stoken-gui-0.81-150400.13.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-20319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20319"
}
],
"notes": [
{
"category": "general",
"text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-doc-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-doc-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:openconnect-lang-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20319",
"url": "https://www.suse.com/security/cve/CVE-2018-20319"
},
{
"category": "external",
"summary": "SUSE Bug 1215669 for CVE-2018-20319",
"url": "https://bugzilla.suse.com/1215669"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-doc-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-doc-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:openconnect-lang-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-doc-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-doc-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:openconnect-lang-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-02-02T09:35:06Z",
"details": "low"
}
],
"title": "CVE-2018-20319"
},
{
"cve": "CVE-2020-12105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12105"
}
],
"notes": [
{
"category": "general",
"text": "OpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-doc-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-doc-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:openconnect-lang-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12105",
"url": "https://www.suse.com/security/cve/CVE-2020-12105"
},
{
"category": "external",
"summary": "SUSE Bug 1170452 for CVE-2020-12105",
"url": "https://bugzilla.suse.com/1170452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-doc-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-doc-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:openconnect-lang-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-doc-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-doc-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:openconnect-lang-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-02-02T09:35:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-12105"
},
{
"cve": "CVE-2020-12823",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12823"
}
],
"notes": [
{
"category": "general",
"text": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-doc-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-doc-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:openconnect-lang-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12823",
"url": "https://www.suse.com/security/cve/CVE-2020-12823"
},
{
"category": "external",
"summary": "SUSE Bug 1171862 for CVE-2020-12823",
"url": "https://bugzilla.suse.com/1171862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-doc-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-doc-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:openconnect-lang-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:liboath0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-doc-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:stoken-gui-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:libstoken1-0.81-150400.13.2.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:openconnect-lang-9.12-150400.15.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:liboath0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:libopenconnect5-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc-devel-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:libpskc0-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:libstoken1-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:oath-toolkit-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:oath-toolkit-xml-2.6.2-150000.3.5.1.noarch",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.aarch64",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.ppc64le",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.s390x",
"openSUSE Leap 15.5:openconnect-devel-9.12-150400.15.3.1.x86_64",
"openSUSE Leap 15.5:openconnect-doc-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:openconnect-lang-9.12-150400.15.3.1.noarch",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.aarch64",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.ppc64le",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.s390x",
"openSUSE Leap 15.5:pam_oath-2.6.2-150000.3.5.1.x86_64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-devel-0.81-150400.13.2.1.x86_64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.aarch64",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.ppc64le",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.s390x",
"openSUSE Leap 15.5:stoken-gui-0.81-150400.13.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-02-02T09:35:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-12823"
}
]
}
suse-su-2020:1930-1
Vulnerability from csaf_suse
Published
2020-07-15 13:05
Modified
2020-07-15 13:05
Summary
Security update for openconnect
Notes
Title of the patch
Security update for openconnect
Description of the patch
This update for openconnect fixes the following issues:
- CVE-2020-12823: Fixed a buffer overflow via crafted certificate data which could have led to denial of service (bsc#1171862).
Patchnames
SUSE-2020-1930,SUSE-SLE-Product-WE-15-SP1-2020-1930,SUSE-SLE-Product-WE-15-SP2-2020-1930
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openconnect",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openconnect fixes the following issues:\n\t \n- CVE-2020-12823: Fixed a buffer overflow via crafted certificate data which could have led to denial of service (bsc#1171862).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2020-1930,SUSE-SLE-Product-WE-15-SP1-2020-1930,SUSE-SLE-Product-WE-15-SP2-2020-1930",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1930-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:1930-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201930-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:1930-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-July/007140.html"
},
{
"category": "self",
"summary": "SUSE Bug 1171862",
"url": "https://bugzilla.suse.com/1171862"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12823 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12823/"
}
],
"title": "Security update for openconnect",
"tracking": {
"current_release_date": "2020-07-15T13:05:26Z",
"generator": {
"date": "2020-07-15T13:05:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:1930-1",
"initial_release_date": "2020-07-15T13:05:26Z",
"revision_history": [
{
"date": "2020-07-15T13:05:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-6.9.1.aarch64",
"product": {
"name": "openconnect-7.08-6.9.1.aarch64",
"product_id": "openconnect-7.08-6.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-6.9.1.aarch64",
"product": {
"name": "openconnect-devel-7.08-6.9.1.aarch64",
"product_id": "openconnect-devel-7.08-6.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-6.9.1.aarch64",
"product": {
"name": "openconnect-doc-7.08-6.9.1.aarch64",
"product_id": "openconnect-doc-7.08-6.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-6.9.1.i586",
"product": {
"name": "openconnect-7.08-6.9.1.i586",
"product_id": "openconnect-7.08-6.9.1.i586"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-6.9.1.i586",
"product": {
"name": "openconnect-devel-7.08-6.9.1.i586",
"product_id": "openconnect-devel-7.08-6.9.1.i586"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-6.9.1.i586",
"product": {
"name": "openconnect-doc-7.08-6.9.1.i586",
"product_id": "openconnect-doc-7.08-6.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-lang-7.08-6.9.1.noarch",
"product": {
"name": "openconnect-lang-7.08-6.9.1.noarch",
"product_id": "openconnect-lang-7.08-6.9.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-6.9.1.ppc64le",
"product": {
"name": "openconnect-7.08-6.9.1.ppc64le",
"product_id": "openconnect-7.08-6.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-6.9.1.ppc64le",
"product": {
"name": "openconnect-devel-7.08-6.9.1.ppc64le",
"product_id": "openconnect-devel-7.08-6.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-6.9.1.ppc64le",
"product": {
"name": "openconnect-doc-7.08-6.9.1.ppc64le",
"product_id": "openconnect-doc-7.08-6.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-6.9.1.s390x",
"product": {
"name": "openconnect-7.08-6.9.1.s390x",
"product_id": "openconnect-7.08-6.9.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-6.9.1.s390x",
"product": {
"name": "openconnect-devel-7.08-6.9.1.s390x",
"product_id": "openconnect-devel-7.08-6.9.1.s390x"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-6.9.1.s390x",
"product": {
"name": "openconnect-doc-7.08-6.9.1.s390x",
"product_id": "openconnect-doc-7.08-6.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openconnect-7.08-6.9.1.x86_64",
"product": {
"name": "openconnect-7.08-6.9.1.x86_64",
"product_id": "openconnect-7.08-6.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-devel-7.08-6.9.1.x86_64",
"product": {
"name": "openconnect-devel-7.08-6.9.1.x86_64",
"product_id": "openconnect-devel-7.08-6.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "openconnect-doc-7.08-6.9.1.x86_64",
"product": {
"name": "openconnect-doc-7.08-6.9.1.x86_64",
"product_id": "openconnect-doc-7.08-6.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-7.08-6.9.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-7.08-6.9.1.x86_64"
},
"product_reference": "openconnect-7.08-6.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-7.08-6.9.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-devel-7.08-6.9.1.x86_64"
},
"product_reference": "openconnect-devel-7.08-6.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-7.08-6.9.1.noarch as component of SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-lang-7.08-6.9.1.noarch"
},
"product_reference": "openconnect-lang-7.08-6.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-7.08-6.9.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:openconnect-7.08-6.9.1.x86_64"
},
"product_reference": "openconnect-7.08-6.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-devel-7.08-6.9.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:openconnect-devel-7.08-6.9.1.x86_64"
},
"product_reference": "openconnect-devel-7.08-6.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openconnect-lang-7.08-6.9.1.noarch as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:openconnect-lang-7.08-6.9.1.noarch"
},
"product_reference": "openconnect-lang-7.08-6.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12823",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12823"
}
],
"notes": [
{
"category": "general",
"text": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-7.08-6.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-devel-7.08-6.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-lang-7.08-6.9.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP2:openconnect-7.08-6.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:openconnect-devel-7.08-6.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:openconnect-lang-7.08-6.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12823",
"url": "https://www.suse.com/security/cve/CVE-2020-12823"
},
{
"category": "external",
"summary": "SUSE Bug 1171862 for CVE-2020-12823",
"url": "https://bugzilla.suse.com/1171862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-7.08-6.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-devel-7.08-6.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-lang-7.08-6.9.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP2:openconnect-7.08-6.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:openconnect-devel-7.08-6.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:openconnect-lang-7.08-6.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-7.08-6.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-devel-7.08-6.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:openconnect-lang-7.08-6.9.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP2:openconnect-7.08-6.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:openconnect-devel-7.08-6.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:openconnect-lang-7.08-6.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-07-15T13:05:26Z",
"details": "moderate"
}
],
"title": "CVE-2020-12823"
}
]
}
cnvd-2020-40736
Vulnerability from cnvd
Title
OpenConnect缓冲区溢出漏洞
Description
OpenConnect是一款用于连接虚拟专用网络的开源应用程序。
OpenConnect 8.09版本中存在缓冲区溢出漏洞。攻击者可通过发送特制证书数据到gnutls.c文件中的get_cert_name利用该漏洞导致拒绝服务(应用程序崩溃)。
Severity
高
VLAI Severity ?
Patch Name
OpenConnect缓冲区溢出漏洞的补丁
Patch Description
OpenConnect是一款用于连接虚拟专用网络的开源应用程序。
OpenConnect 8.09版本中存在缓冲区溢出漏洞。攻击者可通过发送特制证书数据到gnutls.c文件中的get_cert_name利用该漏洞导致拒绝服务(应用程序崩溃)。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://gitlab.com/openconnect/openconnect/-/merge_requests/108
Reference
https://nvd.nist.gov/vuln/detail/CVE-2020-12823
Impacted products
| Name | Openconnect OpenConnect 8.09 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-12823"
}
},
"description": "OpenConnect\u662f\u4e00\u6b3e\u7528\u4e8e\u8fde\u63a5\u865a\u62df\u4e13\u7528\u7f51\u7edc\u7684\u5f00\u6e90\u5e94\u7528\u7a0b\u5e8f\u3002\n\nOpenConnect 8.09\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u7279\u5236\u8bc1\u4e66\u6570\u636e\u5230gnutls.c\u6587\u4ef6\u4e2d\u7684get_cert_name\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\uff08\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\uff09\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://gitlab.com/openconnect/openconnect/-/merge_requests/108",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-40736",
"openTime": "2020-07-17",
"patchDescription": "OpenConnect\u662f\u4e00\u6b3e\u7528\u4e8e\u8fde\u63a5\u865a\u62df\u4e13\u7528\u7f51\u7edc\u7684\u5f00\u6e90\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nOpenConnect 8.09\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u7279\u5236\u8bc1\u4e66\u6570\u636e\u5230gnutls.c\u6587\u4ef6\u4e2d\u7684get_cert_name\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\uff08\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "OpenConnect\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Openconnect OpenConnect 8.09"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-12823",
"serverity": "\u9ad8",
"submitTime": "2020-05-14",
"title": "OpenConnect\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}
ghsa-f93c-rq5c-gvpf
Vulnerability from github
Published
2022-05-24 17:17
Modified
2023-01-27 21:31
Severity ?
VLAI Severity ?
Details
OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.
{
"affected": [],
"aliases": [
"CVE-2020-12823"
],
"database_specific": {
"cwe_ids": [
"CWE-120"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-05-12T18:15:00Z",
"severity": "HIGH"
},
"details": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.",
"id": "GHSA-f93c-rq5c-gvpf",
"modified": "2023-01-27T21:31:14Z",
"published": "2022-05-24T17:17:41Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12823"
},
{
"type": "WEB",
"url": "https://bugs.gentoo.org/721570"
},
{
"type": "WEB",
"url": "https://gitlab.com/openconnect/openconnect/-/merge_requests/108"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202006-15"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
fkie_cve-2020-12823
Vulnerability from fkie_nvd
Published
2020-05-12 18:15
Modified
2024-11-21 05:00
Severity ?
Summary
OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://bugs.gentoo.org/721570 | Exploit, Third Party Advisory | |
| cve@mitre.org | https://gitlab.com/openconnect/openconnect/-/merge_requests/108 | Patch, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/ | ||
| cve@mitre.org | https://security.gentoo.org/glsa/202006-15 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugs.gentoo.org/721570 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.com/openconnect/openconnect/-/merge_requests/108 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202006-15 | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| infradead | openconnect | 8.09 | |
| fedoraproject | fedora | 30 | |
| fedoraproject | fedora | 31 | |
| fedoraproject | fedora | 32 | |
| debian | debian_linux | 8.0 | |
| opensuse | leap | 15.1 | |
| opensuse | leap | 15.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:infradead:openconnect:8.09:*:*:*:*:*:*:*",
"matchCriteriaId": "31F251A6-4429-40A0-B237-E7AB9B58FFB1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c."
},
{
"lang": "es",
"value": "OpenConnect versi\u00f3n 8.09, presenta un desbordamiento del b\u00fafer, causando una denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n) o posiblemente otro impacto no especificado, por medio de datos de certificado dise\u00f1ados en la funci\u00f3n get_cert_name en el archivo gnutls.c."
}
],
"id": "CVE-2020-12823",
"lastModified": "2024-11-21T05:00:20.483",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-05-12T18:15:13.473",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://bugs.gentoo.org/721570"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gitlab.com/openconnect/openconnect/-/merge_requests/108"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202006-15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://bugs.gentoo.org/721570"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gitlab.com/openconnect/openconnect/-/merge_requests/108"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202006-15"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2020-12823
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2020-12823",
"description": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.",
"id": "GSD-2020-12823",
"references": [
"https://www.suse.com/security/cve/CVE-2020-12823.html",
"https://advisories.mageia.org/CVE-2020-12823.html",
"https://security.archlinux.org/CVE-2020-12823"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-12823"
],
"details": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.",
"id": "GSD-2020-12823",
"modified": "2023-12-13T01:21:49.193381Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-12823",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.com/openconnect/openconnect/-/merge_requests/108",
"refsource": "MISC",
"url": "https://gitlab.com/openconnect/openconnect/-/merge_requests/108"
},
{
"name": "https://bugs.gentoo.org/721570",
"refsource": "MISC",
"url": "https://bugs.gentoo.org/721570"
},
{
"name": "[debian-lts-announce] 20200516 [SECURITY] [DLA 2212-1] openconnect security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html"
},
{
"name": "FEDORA-2020-143735a624",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/"
},
{
"name": "FEDORA-2020-2af15c566e",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/"
},
{
"name": "FEDORA-2020-bc22f06aa3",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/"
},
{
"name": "GLSA-202006-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202006-15"
},
{
"name": "openSUSE-SU-2020:0997",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html"
},
{
"name": "openSUSE-SU-2020:1027",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:infradead:openconnect:8.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-12823"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugs.gentoo.org/721570",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://bugs.gentoo.org/721570"
},
{
"name": "https://gitlab.com/openconnect/openconnect/-/merge_requests/108",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gitlab.com/openconnect/openconnect/-/merge_requests/108"
},
{
"name": "[debian-lts-announce] 20200516 [SECURITY] [DLA 2212-1] openconnect security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html"
},
{
"name": "FEDORA-2020-143735a624",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/"
},
{
"name": "FEDORA-2020-2af15c566e",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/"
},
{
"name": "FEDORA-2020-bc22f06aa3",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/"
},
{
"name": "GLSA-202006-15",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202006-15"
},
{
"name": "openSUSE-SU-2020:0997",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html"
},
{
"name": "openSUSE-SU-2020:1027",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-01-27T18:44Z",
"publishedDate": "2020-05-12T18:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…