Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-41991 (GCVE-0-2021-41991)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.655Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strongswan/strongswan/releases/tag/5.9.4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html" }, { "name": "DSA-4989", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4989" }, { "name": "[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html" }, { "name": "FEDORA-2021-0b37146973", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/" }, { "name": "FEDORA-2021-b3df83339e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/" }, { "name": "FEDORA-2021-95fab6a482", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-08T12:06:09", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strongswan/strongswan/releases/tag/5.9.4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html" }, { "name": "DSA-4989", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4989" }, { "name": "[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html" }, { "name": "FEDORA-2021-0b37146973", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/" }, { "name": "FEDORA-2021-b3df83339e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/" }, { "name": "FEDORA-2021-95fab6a482", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41991", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/strongswan/strongswan/releases/tag/5.9.4", "refsource": "MISC", "url": "https://github.com/strongswan/strongswan/releases/tag/5.9.4" }, { "name": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html", "refsource": "CONFIRM", "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html" }, { "name": "DSA-4989", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4989" }, { "name": "[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html" }, { "name": "FEDORA-2021-0b37146973", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/" }, { "name": "FEDORA-2021-b3df83339e", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/" }, { "name": "FEDORA-2021-95fab6a482", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41991", "datePublished": "2021-10-18T13:44:25", "dateReserved": "2021-10-04T00:00:00", "dateUpdated": "2024-08-04T03:22:25.655Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-41991\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-10-18T14:15:10.333\",\"lastModified\":\"2024-11-21T06:27:02.090\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.\"},{\"lang\":\"es\",\"value\":\"La cach\u00e9 de certificados en memoria en strongSwan versiones anteriores a 5.9.4, presenta un desbordamiento de enteros remoto al recibir muchas peticiones con diferentes certificados para llenar la cach\u00e9 y posteriormente desencadenar la sustituci\u00f3n de las entradas de la cach\u00e9. El c\u00f3digo intenta seleccionar una entrada de cach\u00e9 menos usada mediante un generador de n\u00fameros aleatorios, pero esto no es realizado correctamente. Una ejecuci\u00f3n de c\u00f3digo remota podr\u00eda ser una peque\u00f1a posibilidad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2.10\",\"versionEndExcluding\":\"5.9.4\",\"matchCriteriaId\":\"AE9611E9-41E8-4C83-BB26-E52C35252022\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinema_remote_connect_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"276E81AE-85C3-4DBA-B4E6-0BFD85DE03F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18A57CBB-1089-4829-AD1E-89C927611A36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF3E5DDA-1BD4-4511-A2C8-4B5D40E6755E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"373B769D-0E60-4362-BAE1-90BA6E0B211C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA9BB25C-D5E3-43DE-8C73-06BDC43CA960\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"049460B8-6186-44F9-B41F-284A2EC0B3B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"205482DA-548C-4757-91F0-1599438873BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2009C1FA-96D5-413C-9161-0DB55F841088\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"350FD323-C876-4C7A-A2E7-4B0660C87F6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_sc632-2c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF3D204-F783-4ED8-B6DC-7BAE65AB5E89\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_sc632-2c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A79836B-5EC1-40AF-8A57-9657EF6758E5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16B3F1A4-6AA2-48C4-B2B3-7CCFED8E35B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A60FC550-A518-46BF-9124-E21DD654981C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:cp_1543-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8E64DDA-3855-4CDB-A42C-EE23FEDA9074\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F703FF33-882F-4CB5-9CA0-8FAE670B2AEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A46FF27-6B0D-4606-9D7B-45912556416F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1256EB4B-DD8A-4F99-AE69-F74E8F789C63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01483C0C-8A8D-4059-B4F6-D280A71178B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1543sp-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"843A8686-5172-4782-BB97-B5D3C6FB27A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_eu_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80303992-FA4F-4F53-8A52-BF2E2BFB99A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"209C7B1E-10F6-4215-AF69-CC36192E0FCE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1243-7_lte\\\\/us_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D78E94-D826-4300-BD3D-E544A1D67B0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1243-7_lte\\\\/us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00DDA679-D761-4986-A0A0-4C00178DF0B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1542sp-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7F1C19F-FCF8-4BB5-BDAE-F7B188A85A1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1542sp-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C868560-8BAE-462D-AED0-3C52EA9B6DB8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_sc636-2c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50CB213E-50AC-418F-A4CF-AEE1E0D74E00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_sc636-2c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB9BD17-7F1F-42E9-831F-EB907F9BC214\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C33C9CC6-C03E-47CA-9B8F-96C05C5A4DEE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1542sp-1_irc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E362CEA5-F47B-4294-8F2D-A0A7AC6FF390\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_sc642-2c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBCABEAA-F652-4DB4-89F9-19C6C3B7FB11\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_sc642-2c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10C7D54A-27B4-4195-8131-DD5380472A75\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.3\",\"matchCriteriaId\":\"656082A8-8160-4A1A-967B-F7CC27A218D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_sc646-2c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E54AF1E6-0E52-447C-8946-18716D30EBE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_sc622-2c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC252750-1EFC-4AA3-9477-A49E3BBD61F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_sc622-2c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50FEE5FA-B141-4E5F-8673-363089262530\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_rail_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"934FCA36-A4F2-4B90-93DE-48A3A355D865\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1_rail:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A294530-727C-4535-8B02-668DF74587D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"425AB6D7-7325-4028-9065-D24C597BEB62\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9E746CF-4009-4A14-8916-A9E0276CAF8B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A48B4A9-F8D3-433F-A95B-B541C13FF2C4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D7AB0D5-FD3E-416A-975B-D212B3350433\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"336471A8-D4AF-4935-B170-DAB2267C61DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25634AD2-2CC0-45AF-B5DE-39D30CBA91A4\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/strongswan/strongswan/releases/tag/5.9.4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.debian.org/security/2021/dsa-4989\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/strongswan/strongswan/releases/tag/5.9.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2021/dsa-4989\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
suse-su-2021:14827-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for strongswan", "title": "Title of the patch" }, { "category": "description", "text": "This update for strongswan fixes the following issues:\n\n- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-strongswan-14827,slessp4-strongswan-14827", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_14827-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:14827-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-202114827-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:14827-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009612.html" }, { "category": "self", "summary": "SUSE Bug 1191435", "url": "https://bugzilla.suse.com/1191435" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41991 page", "url": "https://www.suse.com/security/cve/CVE-2021-41991/" } ], "title": "Security update for strongswan", "tracking": { "current_release_date": "2021-10-19T11:16:08Z", "generator": { "date": "2021-10-19T11:16:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:14827-1", "initial_release_date": "2021-10-19T11:16:08Z", "revision_history": [ { "date": "2021-10-19T11:16:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "strongswan-4.4.0-6.36.9.1.i586", "product": { "name": "strongswan-4.4.0-6.36.9.1.i586", "product_id": "strongswan-4.4.0-6.36.9.1.i586" } }, { "category": "product_version", "name": "strongswan-doc-4.4.0-6.36.9.1.i586", "product": { "name": "strongswan-doc-4.4.0-6.36.9.1.i586", "product_id": "strongswan-doc-4.4.0-6.36.9.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "strongswan-4.4.0-6.36.9.1.ppc64", "product": { "name": "strongswan-4.4.0-6.36.9.1.ppc64", "product_id": "strongswan-4.4.0-6.36.9.1.ppc64" } }, { "category": "product_version", "name": "strongswan-doc-4.4.0-6.36.9.1.ppc64", "product": { "name": "strongswan-doc-4.4.0-6.36.9.1.ppc64", "product_id": "strongswan-doc-4.4.0-6.36.9.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "strongswan-4.4.0-6.36.9.1.s390x", "product": { "name": "strongswan-4.4.0-6.36.9.1.s390x", "product_id": "strongswan-4.4.0-6.36.9.1.s390x" } }, { "category": "product_version", "name": "strongswan-doc-4.4.0-6.36.9.1.s390x", "product": { "name": "strongswan-doc-4.4.0-6.36.9.1.s390x", "product_id": "strongswan-doc-4.4.0-6.36.9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "strongswan-4.4.0-6.36.9.1.x86_64", "product": { "name": "strongswan-4.4.0-6.36.9.1.x86_64", "product_id": "strongswan-4.4.0-6.36.9.1.x86_64" } }, { "category": "product_version", "name": "strongswan-doc-4.4.0-6.36.9.1.x86_64", "product": { "name": "strongswan-doc-4.4.0-6.36.9.1.x86_64", "product_id": "strongswan-doc-4.4.0-6.36.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "strongswan-4.4.0-6.36.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-4.4.0-6.36.9.1.i586" }, "product_reference": "strongswan-4.4.0-6.36.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-4.4.0-6.36.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-doc-4.4.0-6.36.9.1.i586" }, "product_reference": "strongswan-doc-4.4.0-6.36.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-4.4.0-6.36.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.i586" }, "product_reference": "strongswan-4.4.0-6.36.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-4.4.0-6.36.9.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.ppc64" }, "product_reference": "strongswan-4.4.0-6.36.9.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-4.4.0-6.36.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.s390x" }, "product_reference": "strongswan-4.4.0-6.36.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-4.4.0-6.36.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.x86_64" }, "product_reference": "strongswan-4.4.0-6.36.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-4.4.0-6.36.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.i586" }, "product_reference": "strongswan-doc-4.4.0-6.36.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-4.4.0-6.36.9.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.ppc64" }, "product_reference": "strongswan-doc-4.4.0-6.36.9.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-4.4.0-6.36.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.s390x" }, "product_reference": "strongswan-doc-4.4.0-6.36.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-4.4.0-6.36.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.x86_64" }, "product_reference": "strongswan-doc-4.4.0-6.36.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41991", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41991" } ], "notes": [ { "category": "general", "text": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-doc-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41991", "url": "https://www.suse.com/security/cve/CVE-2021-41991" }, { "category": "external", "summary": "SUSE Bug 1191367 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191367" }, { "category": "external", "summary": "SUSE Bug 1191435 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191435" }, { "category": "external", "summary": "SUSE Bug 1192640 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1192640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-doc-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-doc-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-19T11:16:08Z", "details": "important" } ], "title": "CVE-2021-41991" } ] }
suse-su-2021:3469-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for strongswan", "title": "Title of the patch" }, { "category": "description", "text": "This update for strongswan fixes the following issues:\n\n- Fix trailing quotation mark missing from example in README. (bsc#1167880)\n- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)\n- CVE-2021-41990: Fixed an integer Overflow in the gmp Plugin. (bsc#1191367)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-3469,SUSE-SLE-Product-HPC-15-2021-3469,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3469,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3469,SUSE-SLE-Product-SLES-15-2021-3469,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3469,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3469,SUSE-SLE-Product-SLES_SAP-15-2021-3469,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3469,SUSE-Storage-6-2021-3469", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3469-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:3469-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213469-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:3469-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009614.html" }, { "category": "self", "summary": "SUSE Bug 1167880", "url": "https://bugzilla.suse.com/1167880" }, { "category": "self", "summary": "SUSE Bug 1191367", "url": "https://bugzilla.suse.com/1191367" }, { "category": "self", "summary": "SUSE Bug 1191435", "url": "https://bugzilla.suse.com/1191435" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41990 page", "url": "https://www.suse.com/security/cve/CVE-2021-41990/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41991 page", "url": "https://www.suse.com/security/cve/CVE-2021-41991/" } ], "title": "Security update for strongswan", "tracking": { "current_release_date": "2021-10-19T13:45:21Z", "generator": { "date": "2021-10-19T13:45:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:3469-1", "initial_release_date": "2021-10-19T13:45:21Z", "revision_history": [ { "date": "2021-10-19T13:45:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-4.14.2.aarch64", "product": { "name": "strongswan-5.8.2-4.14.2.aarch64", "product_id": "strongswan-5.8.2-4.14.2.aarch64" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-4.14.2.aarch64", "product": { "name": "strongswan-hmac-5.8.2-4.14.2.aarch64", "product_id": "strongswan-hmac-5.8.2-4.14.2.aarch64" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-4.14.2.aarch64", "product": { "name": "strongswan-ipsec-5.8.2-4.14.2.aarch64", "product_id": "strongswan-ipsec-5.8.2-4.14.2.aarch64" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-4.14.2.aarch64", "product": { "name": "strongswan-libs0-5.8.2-4.14.2.aarch64", "product_id": "strongswan-libs0-5.8.2-4.14.2.aarch64" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-4.14.2.aarch64", "product": { "name": "strongswan-mysql-5.8.2-4.14.2.aarch64", "product_id": "strongswan-mysql-5.8.2-4.14.2.aarch64" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-4.14.2.aarch64", "product": { "name": "strongswan-nm-5.8.2-4.14.2.aarch64", "product_id": "strongswan-nm-5.8.2-4.14.2.aarch64" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-4.14.2.aarch64", "product": { "name": "strongswan-sqlite-5.8.2-4.14.2.aarch64", "product_id": "strongswan-sqlite-5.8.2-4.14.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-4.14.2.i586", "product": { "name": "strongswan-5.8.2-4.14.2.i586", "product_id": "strongswan-5.8.2-4.14.2.i586" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-4.14.2.i586", "product": { "name": "strongswan-hmac-5.8.2-4.14.2.i586", "product_id": "strongswan-hmac-5.8.2-4.14.2.i586" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-4.14.2.i586", "product": { "name": "strongswan-ipsec-5.8.2-4.14.2.i586", "product_id": "strongswan-ipsec-5.8.2-4.14.2.i586" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-4.14.2.i586", "product": { "name": "strongswan-libs0-5.8.2-4.14.2.i586", "product_id": "strongswan-libs0-5.8.2-4.14.2.i586" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-4.14.2.i586", "product": { "name": "strongswan-mysql-5.8.2-4.14.2.i586", "product_id": "strongswan-mysql-5.8.2-4.14.2.i586" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-4.14.2.i586", "product": { "name": "strongswan-nm-5.8.2-4.14.2.i586", "product_id": "strongswan-nm-5.8.2-4.14.2.i586" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-4.14.2.i586", "product": { "name": "strongswan-sqlite-5.8.2-4.14.2.i586", "product_id": "strongswan-sqlite-5.8.2-4.14.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "strongswan-doc-5.8.2-4.14.2.noarch", "product": { "name": "strongswan-doc-5.8.2-4.14.2.noarch", "product_id": "strongswan-doc-5.8.2-4.14.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-4.14.2.ppc64le", "product": { "name": "strongswan-5.8.2-4.14.2.ppc64le", "product_id": "strongswan-5.8.2-4.14.2.ppc64le" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-4.14.2.ppc64le", "product": { "name": "strongswan-hmac-5.8.2-4.14.2.ppc64le", "product_id": "strongswan-hmac-5.8.2-4.14.2.ppc64le" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-4.14.2.ppc64le", "product": { "name": "strongswan-ipsec-5.8.2-4.14.2.ppc64le", "product_id": "strongswan-ipsec-5.8.2-4.14.2.ppc64le" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-4.14.2.ppc64le", "product": { "name": "strongswan-libs0-5.8.2-4.14.2.ppc64le", "product_id": "strongswan-libs0-5.8.2-4.14.2.ppc64le" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-4.14.2.ppc64le", "product": { "name": "strongswan-mysql-5.8.2-4.14.2.ppc64le", "product_id": "strongswan-mysql-5.8.2-4.14.2.ppc64le" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-4.14.2.ppc64le", "product": { "name": "strongswan-nm-5.8.2-4.14.2.ppc64le", "product_id": "strongswan-nm-5.8.2-4.14.2.ppc64le" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-4.14.2.ppc64le", "product": { "name": "strongswan-sqlite-5.8.2-4.14.2.ppc64le", "product_id": "strongswan-sqlite-5.8.2-4.14.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-4.14.2.s390x", "product": { "name": "strongswan-5.8.2-4.14.2.s390x", "product_id": "strongswan-5.8.2-4.14.2.s390x" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-4.14.2.s390x", "product": { "name": "strongswan-hmac-5.8.2-4.14.2.s390x", "product_id": "strongswan-hmac-5.8.2-4.14.2.s390x" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-4.14.2.s390x", "product": { "name": "strongswan-ipsec-5.8.2-4.14.2.s390x", "product_id": "strongswan-ipsec-5.8.2-4.14.2.s390x" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-4.14.2.s390x", "product": { "name": "strongswan-libs0-5.8.2-4.14.2.s390x", "product_id": "strongswan-libs0-5.8.2-4.14.2.s390x" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-4.14.2.s390x", "product": { "name": "strongswan-mysql-5.8.2-4.14.2.s390x", "product_id": "strongswan-mysql-5.8.2-4.14.2.s390x" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-4.14.2.s390x", "product": { "name": "strongswan-nm-5.8.2-4.14.2.s390x", "product_id": "strongswan-nm-5.8.2-4.14.2.s390x" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-4.14.2.s390x", "product": { "name": "strongswan-sqlite-5.8.2-4.14.2.s390x", "product_id": "strongswan-sqlite-5.8.2-4.14.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-4.14.2.x86_64", "product": { "name": "strongswan-5.8.2-4.14.2.x86_64", "product_id": "strongswan-5.8.2-4.14.2.x86_64" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-4.14.2.x86_64", "product": { "name": "strongswan-hmac-5.8.2-4.14.2.x86_64", "product_id": "strongswan-hmac-5.8.2-4.14.2.x86_64" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-4.14.2.x86_64", "product": { "name": "strongswan-ipsec-5.8.2-4.14.2.x86_64", "product_id": "strongswan-ipsec-5.8.2-4.14.2.x86_64" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-4.14.2.x86_64", "product": { "name": "strongswan-libs0-5.8.2-4.14.2.x86_64", "product_id": "strongswan-libs0-5.8.2-4.14.2.x86_64" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-4.14.2.x86_64", "product": { "name": "strongswan-mysql-5.8.2-4.14.2.x86_64", "product_id": "strongswan-mysql-5.8.2-4.14.2.x86_64" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-4.14.2.x86_64", "product": { "name": "strongswan-nm-5.8.2-4.14.2.x86_64", "product_id": "strongswan-nm-5.8.2-4.14.2.x86_64" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-4.14.2.x86_64", "product": { "name": "strongswan-sqlite-5.8.2-4.14.2.x86_64", "product_id": "strongswan-sqlite-5.8.2-4.14.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch" }, "product_reference": "strongswan-doc-5.8.2-4.14.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch" }, "product_reference": "strongswan-doc-5.8.2-4.14.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch" }, "product_reference": "strongswan-doc-5.8.2-4.14.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch" }, "product_reference": "strongswan-doc-5.8.2-4.14.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x" }, "product_reference": "strongswan-5.8.2-4.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch" }, "product_reference": "strongswan-doc-5.8.2-4.14.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch" }, "product_reference": "strongswan-doc-5.8.2-4.14.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x" }, "product_reference": "strongswan-5.8.2-4.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch" }, "product_reference": "strongswan-doc-5.8.2-4.14.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch" }, "product_reference": "strongswan-doc-5.8.2-4.14.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch" }, "product_reference": "strongswan-doc-5.8.2-4.14.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch" }, "product_reference": "strongswan-doc-5.8.2-4.14.2.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-4.14.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41990" } ], "notes": [ { "category": "general", "text": "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41990", "url": "https://www.suse.com/security/cve/CVE-2021-41990" }, { "category": "external", "summary": "SUSE Bug 1191367 for CVE-2021-41990", "url": "https://bugzilla.suse.com/1191367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-19T13:45:21Z", "details": "important" } ], "title": "CVE-2021-41990" }, { "cve": "CVE-2021-41991", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41991" } ], "notes": [ { "category": "general", "text": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41991", "url": "https://www.suse.com/security/cve/CVE-2021-41991" }, { "category": "external", "summary": "SUSE Bug 1191367 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191367" }, { "category": "external", "summary": "SUSE Bug 1191435 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191435" }, { "category": "external", "summary": "SUSE Bug 1192640 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1192640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-19T13:45:21Z", "details": "important" } ], "title": "CVE-2021-41991" } ] }
suse-su-2021:3467-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for strongswan", "title": "Title of the patch" }, { "category": "description", "text": "This update for strongswan fixes the following issues:\n\nA feature was added:\n\n- Add auth_els plugin to support Marvell FC-SP encryption (jsc#SLE-20151)\n\nSecurity issues fixed:\n\n- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)\n- CVE-2021-41990: Fixed an integer Overflow in the gmp Plugin. (bsc#1191367)\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-3467,SUSE-SLE-Module-Basesystem-15-SP2-2021-3467,SUSE-SLE-Module-Basesystem-15-SP3-2021-3467,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-3467,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3467,SUSE-SLE-Product-WE-15-SP2-2021-3467,SUSE-SLE-Product-WE-15-SP3-2021-3467", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3467-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:3467-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213467-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:3467-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009613.html" }, { "category": "self", "summary": "SUSE Bug 1191367", "url": "https://bugzilla.suse.com/1191367" }, { "category": "self", "summary": "SUSE Bug 1191435", "url": "https://bugzilla.suse.com/1191435" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41990 page", "url": "https://www.suse.com/security/cve/CVE-2021-41990/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41991 page", "url": "https://www.suse.com/security/cve/CVE-2021-41991/" } ], "title": "Security update for strongswan", "tracking": { "current_release_date": "2021-10-19T11:16:44Z", "generator": { "date": "2021-10-19T11:16:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:3467-1", "initial_release_date": "2021-10-19T11:16:44Z", "revision_history": [ { "date": "2021-10-19T11:16:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-5.8.2-11.21.1.aarch64", "product_id": "strongswan-5.8.2-11.21.1.aarch64" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-hmac-5.8.2-11.21.1.aarch64", "product_id": "strongswan-hmac-5.8.2-11.21.1.aarch64" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-ipsec-5.8.2-11.21.1.aarch64", "product_id": "strongswan-ipsec-5.8.2-11.21.1.aarch64" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-libs0-5.8.2-11.21.1.aarch64", "product_id": "strongswan-libs0-5.8.2-11.21.1.aarch64" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-mysql-5.8.2-11.21.1.aarch64", "product_id": "strongswan-mysql-5.8.2-11.21.1.aarch64" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-nm-5.8.2-11.21.1.aarch64", "product_id": "strongswan-nm-5.8.2-11.21.1.aarch64" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-sqlite-5.8.2-11.21.1.aarch64", "product_id": "strongswan-sqlite-5.8.2-11.21.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-11.21.1.i586", "product": { "name": "strongswan-5.8.2-11.21.1.i586", "product_id": "strongswan-5.8.2-11.21.1.i586" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-11.21.1.i586", "product": { "name": "strongswan-hmac-5.8.2-11.21.1.i586", "product_id": "strongswan-hmac-5.8.2-11.21.1.i586" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-11.21.1.i586", "product": { "name": "strongswan-ipsec-5.8.2-11.21.1.i586", "product_id": "strongswan-ipsec-5.8.2-11.21.1.i586" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-11.21.1.i586", "product": { "name": "strongswan-libs0-5.8.2-11.21.1.i586", "product_id": "strongswan-libs0-5.8.2-11.21.1.i586" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-11.21.1.i586", "product": { "name": "strongswan-mysql-5.8.2-11.21.1.i586", "product_id": "strongswan-mysql-5.8.2-11.21.1.i586" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-11.21.1.i586", "product": { "name": "strongswan-nm-5.8.2-11.21.1.i586", "product_id": "strongswan-nm-5.8.2-11.21.1.i586" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-11.21.1.i586", "product": { "name": "strongswan-sqlite-5.8.2-11.21.1.i586", "product_id": "strongswan-sqlite-5.8.2-11.21.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "strongswan-doc-5.8.2-11.21.1.noarch", "product": { "name": "strongswan-doc-5.8.2-11.21.1.noarch", "product_id": "strongswan-doc-5.8.2-11.21.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-5.8.2-11.21.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-hmac-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-hmac-5.8.2-11.21.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-ipsec-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-ipsec-5.8.2-11.21.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-libs0-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-libs0-5.8.2-11.21.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-mysql-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-mysql-5.8.2-11.21.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-nm-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-nm-5.8.2-11.21.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-sqlite-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-sqlite-5.8.2-11.21.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-5.8.2-11.21.1.s390x", "product_id": "strongswan-5.8.2-11.21.1.s390x" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-hmac-5.8.2-11.21.1.s390x", "product_id": "strongswan-hmac-5.8.2-11.21.1.s390x" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-ipsec-5.8.2-11.21.1.s390x", "product_id": "strongswan-ipsec-5.8.2-11.21.1.s390x" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-libs0-5.8.2-11.21.1.s390x", "product_id": "strongswan-libs0-5.8.2-11.21.1.s390x" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-mysql-5.8.2-11.21.1.s390x", "product_id": "strongswan-mysql-5.8.2-11.21.1.s390x" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-nm-5.8.2-11.21.1.s390x", "product_id": "strongswan-nm-5.8.2-11.21.1.s390x" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-sqlite-5.8.2-11.21.1.s390x", "product_id": "strongswan-sqlite-5.8.2-11.21.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-5.8.2-11.21.1.x86_64", "product_id": "strongswan-5.8.2-11.21.1.x86_64" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-hmac-5.8.2-11.21.1.x86_64", "product_id": "strongswan-hmac-5.8.2-11.21.1.x86_64" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-ipsec-5.8.2-11.21.1.x86_64", "product_id": "strongswan-ipsec-5.8.2-11.21.1.x86_64" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-libs0-5.8.2-11.21.1.x86_64", "product_id": "strongswan-libs0-5.8.2-11.21.1.x86_64" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-mysql-5.8.2-11.21.1.x86_64", "product_id": "strongswan-mysql-5.8.2-11.21.1.x86_64" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-nm-5.8.2-11.21.1.x86_64", "product_id": "strongswan-nm-5.8.2-11.21.1.x86_64" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-sqlite-5.8.2-11.21.1.x86_64", "product_id": "strongswan-sqlite-5.8.2-11.21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP2", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP3", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP3", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-5.8.2-11.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-11.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch" }, "product_reference": "strongswan-doc-5.8.2-11.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-hmac-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-hmac-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-hmac-5.8.2-11.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-ipsec-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-ipsec-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-ipsec-5.8.2-11.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-libs0-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-libs0-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-libs0-5.8.2-11.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-5.8.2-11.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-11.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch" }, "product_reference": "strongswan-doc-5.8.2-11.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-hmac-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-hmac-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-hmac-5.8.2-11.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-ipsec-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-ipsec-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-ipsec-5.8.2-11.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-libs0-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-libs0-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-libs0-5.8.2-11.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP2", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP2", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP2", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP2", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41990" } ], "notes": [ { "category": "general", "text": "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41990", "url": "https://www.suse.com/security/cve/CVE-2021-41990" }, { "category": "external", "summary": "SUSE Bug 1191367 for CVE-2021-41990", "url": "https://bugzilla.suse.com/1191367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-19T11:16:44Z", "details": "important" } ], "title": "CVE-2021-41990" }, { "cve": "CVE-2021-41991", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41991" } ], "notes": [ { "category": "general", "text": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41991", "url": "https://www.suse.com/security/cve/CVE-2021-41991" }, { "category": "external", "summary": "SUSE Bug 1191367 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191367" }, { "category": "external", "summary": "SUSE Bug 1191435 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191435" }, { "category": "external", "summary": "SUSE Bug 1192640 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1192640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-19T11:16:44Z", "details": "important" } ], "title": "CVE-2021-41991" } ] }
suse-su-2021:3468-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for strongswan", "title": "Title of the patch" }, { "category": "description", "text": "This update for strongswan fixes the following issues:\n\n- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2021-3468,SUSE-2021-3468,SUSE-OpenStack-Cloud-8-2021-3468,SUSE-OpenStack-Cloud-9-2021-3468,SUSE-OpenStack-Cloud-Crowbar-8-2021-3468,SUSE-OpenStack-Cloud-Crowbar-9-2021-3468,SUSE-SLE-SAP-12-SP3-2021-3468,SUSE-SLE-SAP-12-SP4-2021-3468,SUSE-SLE-SERVER-12-SP2-BCL-2021-3468,SUSE-SLE-SERVER-12-SP3-2021-3468,SUSE-SLE-SERVER-12-SP3-BCL-2021-3468,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3468,SUSE-SLE-SERVER-12-SP5-2021-3468", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3468-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:3468-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213468-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:3468-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009611.html" }, { "category": "self", "summary": "SUSE Bug 1191435", "url": "https://bugzilla.suse.com/1191435" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41991 page", "url": "https://www.suse.com/security/cve/CVE-2021-41991/" } ], "title": "Security update for strongswan", "tracking": { "current_release_date": "2021-10-19T11:16:54Z", "generator": { "date": "2021-10-19T11:16:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:3468-1", "initial_release_date": "2021-10-19T11:16:54Z", "revision_history": [ { "date": "2021-10-19T11:16:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "strongswan-5.1.3-26.16.1.aarch64", "product": { "name": "strongswan-5.1.3-26.16.1.aarch64", "product_id": "strongswan-5.1.3-26.16.1.aarch64" } }, { "category": "product_version", "name": "strongswan-cavs-5.1.3-26.16.1.aarch64", "product": { "name": "strongswan-cavs-5.1.3-26.16.1.aarch64", "product_id": "strongswan-cavs-5.1.3-26.16.1.aarch64" } }, { "category": "product_version", "name": "strongswan-hmac-5.1.3-26.16.1.aarch64", "product": { "name": "strongswan-hmac-5.1.3-26.16.1.aarch64", "product_id": "strongswan-hmac-5.1.3-26.16.1.aarch64" } }, { "category": "product_version", "name": "strongswan-ipsec-5.1.3-26.16.1.aarch64", "product": { "name": "strongswan-ipsec-5.1.3-26.16.1.aarch64", "product_id": "strongswan-ipsec-5.1.3-26.16.1.aarch64" } }, { "category": "product_version", "name": "strongswan-libs0-5.1.3-26.16.1.aarch64", "product": { "name": "strongswan-libs0-5.1.3-26.16.1.aarch64", "product_id": "strongswan-libs0-5.1.3-26.16.1.aarch64" } }, { "category": "product_version", "name": "strongswan-mysql-5.1.3-26.16.1.aarch64", "product": { "name": "strongswan-mysql-5.1.3-26.16.1.aarch64", "product_id": "strongswan-mysql-5.1.3-26.16.1.aarch64" } }, { "category": "product_version", "name": "strongswan-nm-5.1.3-26.16.1.aarch64", "product": { "name": "strongswan-nm-5.1.3-26.16.1.aarch64", "product_id": "strongswan-nm-5.1.3-26.16.1.aarch64" } }, { "category": "product_version", "name": "strongswan-sqlite-5.1.3-26.16.1.aarch64", "product": { "name": "strongswan-sqlite-5.1.3-26.16.1.aarch64", "product_id": "strongswan-sqlite-5.1.3-26.16.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.1.3-26.16.1.i586", "product": { "name": "strongswan-5.1.3-26.16.1.i586", "product_id": "strongswan-5.1.3-26.16.1.i586" } }, { "category": "product_version", "name": "strongswan-cavs-5.1.3-26.16.1.i586", "product": { "name": "strongswan-cavs-5.1.3-26.16.1.i586", "product_id": "strongswan-cavs-5.1.3-26.16.1.i586" } }, { "category": "product_version", "name": "strongswan-hmac-5.1.3-26.16.1.i586", "product": { "name": "strongswan-hmac-5.1.3-26.16.1.i586", "product_id": "strongswan-hmac-5.1.3-26.16.1.i586" } }, { "category": "product_version", "name": "strongswan-ipsec-5.1.3-26.16.1.i586", "product": { "name": "strongswan-ipsec-5.1.3-26.16.1.i586", "product_id": "strongswan-ipsec-5.1.3-26.16.1.i586" } }, { "category": "product_version", "name": "strongswan-libs0-5.1.3-26.16.1.i586", "product": { "name": "strongswan-libs0-5.1.3-26.16.1.i586", "product_id": "strongswan-libs0-5.1.3-26.16.1.i586" } }, { "category": "product_version", "name": "strongswan-mysql-5.1.3-26.16.1.i586", "product": { "name": "strongswan-mysql-5.1.3-26.16.1.i586", "product_id": "strongswan-mysql-5.1.3-26.16.1.i586" } }, { "category": "product_version", "name": "strongswan-nm-5.1.3-26.16.1.i586", "product": { "name": "strongswan-nm-5.1.3-26.16.1.i586", "product_id": "strongswan-nm-5.1.3-26.16.1.i586" } }, { "category": "product_version", "name": "strongswan-sqlite-5.1.3-26.16.1.i586", "product": { "name": "strongswan-sqlite-5.1.3-26.16.1.i586", "product_id": "strongswan-sqlite-5.1.3-26.16.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "strongswan-doc-5.1.3-26.16.1.noarch", "product": { "name": "strongswan-doc-5.1.3-26.16.1.noarch", "product_id": "strongswan-doc-5.1.3-26.16.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.1.3-26.16.1.ppc64le", "product": { "name": "strongswan-5.1.3-26.16.1.ppc64le", "product_id": "strongswan-5.1.3-26.16.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-cavs-5.1.3-26.16.1.ppc64le", "product": { "name": "strongswan-cavs-5.1.3-26.16.1.ppc64le", "product_id": "strongswan-cavs-5.1.3-26.16.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-hmac-5.1.3-26.16.1.ppc64le", "product": { "name": "strongswan-hmac-5.1.3-26.16.1.ppc64le", "product_id": "strongswan-hmac-5.1.3-26.16.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-ipsec-5.1.3-26.16.1.ppc64le", "product": { "name": "strongswan-ipsec-5.1.3-26.16.1.ppc64le", "product_id": "strongswan-ipsec-5.1.3-26.16.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-libs0-5.1.3-26.16.1.ppc64le", "product": { "name": "strongswan-libs0-5.1.3-26.16.1.ppc64le", "product_id": "strongswan-libs0-5.1.3-26.16.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-mysql-5.1.3-26.16.1.ppc64le", "product": { "name": "strongswan-mysql-5.1.3-26.16.1.ppc64le", "product_id": "strongswan-mysql-5.1.3-26.16.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-nm-5.1.3-26.16.1.ppc64le", "product": { "name": "strongswan-nm-5.1.3-26.16.1.ppc64le", "product_id": "strongswan-nm-5.1.3-26.16.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-sqlite-5.1.3-26.16.1.ppc64le", "product": { "name": "strongswan-sqlite-5.1.3-26.16.1.ppc64le", "product_id": "strongswan-sqlite-5.1.3-26.16.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.1.3-26.16.1.s390", "product": { "name": "strongswan-5.1.3-26.16.1.s390", "product_id": "strongswan-5.1.3-26.16.1.s390" } }, { "category": "product_version", "name": "strongswan-cavs-5.1.3-26.16.1.s390", "product": { "name": "strongswan-cavs-5.1.3-26.16.1.s390", "product_id": "strongswan-cavs-5.1.3-26.16.1.s390" } }, { "category": "product_version", "name": "strongswan-hmac-5.1.3-26.16.1.s390", "product": { "name": "strongswan-hmac-5.1.3-26.16.1.s390", "product_id": "strongswan-hmac-5.1.3-26.16.1.s390" } }, { "category": "product_version", "name": "strongswan-ipsec-5.1.3-26.16.1.s390", "product": { "name": "strongswan-ipsec-5.1.3-26.16.1.s390", "product_id": "strongswan-ipsec-5.1.3-26.16.1.s390" } }, { "category": "product_version", "name": "strongswan-libs0-5.1.3-26.16.1.s390", "product": { "name": "strongswan-libs0-5.1.3-26.16.1.s390", "product_id": "strongswan-libs0-5.1.3-26.16.1.s390" } }, { "category": "product_version", "name": "strongswan-mysql-5.1.3-26.16.1.s390", "product": { "name": "strongswan-mysql-5.1.3-26.16.1.s390", "product_id": "strongswan-mysql-5.1.3-26.16.1.s390" } }, { "category": "product_version", "name": "strongswan-nm-5.1.3-26.16.1.s390", "product": { "name": "strongswan-nm-5.1.3-26.16.1.s390", "product_id": "strongswan-nm-5.1.3-26.16.1.s390" } }, { "category": "product_version", "name": "strongswan-sqlite-5.1.3-26.16.1.s390", "product": { "name": "strongswan-sqlite-5.1.3-26.16.1.s390", "product_id": "strongswan-sqlite-5.1.3-26.16.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.1.3-26.16.1.s390x", "product": { "name": "strongswan-5.1.3-26.16.1.s390x", "product_id": "strongswan-5.1.3-26.16.1.s390x" } }, { "category": "product_version", "name": "strongswan-cavs-5.1.3-26.16.1.s390x", "product": { "name": "strongswan-cavs-5.1.3-26.16.1.s390x", "product_id": "strongswan-cavs-5.1.3-26.16.1.s390x" } }, { "category": "product_version", "name": "strongswan-hmac-5.1.3-26.16.1.s390x", "product": { "name": "strongswan-hmac-5.1.3-26.16.1.s390x", "product_id": "strongswan-hmac-5.1.3-26.16.1.s390x" } }, { "category": "product_version", "name": "strongswan-ipsec-5.1.3-26.16.1.s390x", "product": { "name": "strongswan-ipsec-5.1.3-26.16.1.s390x", "product_id": "strongswan-ipsec-5.1.3-26.16.1.s390x" } }, { "category": "product_version", "name": "strongswan-libs0-5.1.3-26.16.1.s390x", "product": { "name": "strongswan-libs0-5.1.3-26.16.1.s390x", "product_id": "strongswan-libs0-5.1.3-26.16.1.s390x" } }, { "category": "product_version", "name": "strongswan-mysql-5.1.3-26.16.1.s390x", "product": { "name": "strongswan-mysql-5.1.3-26.16.1.s390x", "product_id": "strongswan-mysql-5.1.3-26.16.1.s390x" } }, { "category": "product_version", "name": "strongswan-nm-5.1.3-26.16.1.s390x", "product": { "name": "strongswan-nm-5.1.3-26.16.1.s390x", "product_id": "strongswan-nm-5.1.3-26.16.1.s390x" } }, { "category": "product_version", "name": "strongswan-sqlite-5.1.3-26.16.1.s390x", "product": { "name": "strongswan-sqlite-5.1.3-26.16.1.s390x", "product_id": "strongswan-sqlite-5.1.3-26.16.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.1.3-26.16.1.x86_64", "product": { "name": "strongswan-5.1.3-26.16.1.x86_64", "product_id": "strongswan-5.1.3-26.16.1.x86_64" } }, { "category": "product_version", "name": "strongswan-hmac-5.1.3-26.16.1.x86_64", "product": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64", "product_id": "strongswan-hmac-5.1.3-26.16.1.x86_64" } }, { "category": "product_version", "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "product": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "product_id": "strongswan-ipsec-5.1.3-26.16.1.x86_64" } }, { "category": "product_version", "name": "strongswan-libs0-5.1.3-26.16.1.x86_64", "product": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64", "product_id": "strongswan-libs0-5.1.3-26.16.1.x86_64" } }, { "category": "product_version", "name": "strongswan-cavs-5.1.3-26.16.1.x86_64", "product": { "name": "strongswan-cavs-5.1.3-26.16.1.x86_64", "product_id": "strongswan-cavs-5.1.3-26.16.1.x86_64" } }, { "category": "product_version", "name": "strongswan-mysql-5.1.3-26.16.1.x86_64", "product": { "name": "strongswan-mysql-5.1.3-26.16.1.x86_64", "product_id": "strongswan-mysql-5.1.3-26.16.1.x86_64" } }, { "category": "product_version", "name": "strongswan-nm-5.1.3-26.16.1.x86_64", "product": { "name": "strongswan-nm-5.1.3-26.16.1.x86_64", "product_id": "strongswan-nm-5.1.3-26.16.1.x86_64" } }, { "category": "product_version", "name": "strongswan-sqlite-5.1.3-26.16.1.x86_64", "product": { "name": "strongswan-sqlite-5.1.3-26.16.1.x86_64", "product_id": "strongswan-sqlite-5.1.3-26.16.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:strongswan-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.1.3-26.16.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:strongswan-doc-5.1.3-26.16.1.noarch" }, "product_reference": "strongswan-doc-5.1.3-26.16.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:strongswan-hmac-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:strongswan-ipsec-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:strongswan-libs0-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:strongswan-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:strongswan-doc-5.1.3-26.16.1.noarch" }, "product_reference": "strongswan-doc-5.1.3-26.16.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:strongswan-hmac-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:strongswan-ipsec-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:strongswan-libs0-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:strongswan-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:strongswan-doc-5.1.3-26.16.1.noarch" }, "product_reference": "strongswan-doc-5.1.3-26.16.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:strongswan-hmac-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:strongswan-ipsec-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:strongswan-libs0-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:strongswan-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:strongswan-doc-5.1.3-26.16.1.noarch" }, "product_reference": "strongswan-doc-5.1.3-26.16.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:strongswan-hmac-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:strongswan-ipsec-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:strongswan-libs0-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:strongswan-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:strongswan-doc-5.1.3-26.16.1.noarch" }, "product_reference": "strongswan-doc-5.1.3-26.16.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:strongswan-hmac-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:strongswan-ipsec-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:strongswan-libs0-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-doc-5.1.3-26.16.1.noarch" }, "product_reference": "strongswan-doc-5.1.3-26.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-doc-5.1.3-26.16.1.noarch" }, "product_reference": "strongswan-doc-5.1.3-26.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-doc-5.1.3-26.16.1.noarch" }, "product_reference": "strongswan-doc-5.1.3-26.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-doc-5.1.3-26.16.1.noarch" }, "product_reference": "strongswan-doc-5.1.3-26.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-doc-5.1.3-26.16.1.noarch" }, "product_reference": "strongswan-doc-5.1.3-26.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-doc-5.1.3-26.16.1.noarch" }, "product_reference": "strongswan-doc-5.1.3-26.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch" }, "product_reference": "strongswan-doc-5.1.3-26.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch" }, "product_reference": "strongswan-doc-5.1.3-26.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-hmac-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-ipsec-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64" }, "product_reference": "strongswan-libs0-5.1.3-26.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41991", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41991" } ], "notes": [ { "category": "general", "text": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:strongswan-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-doc-5.1.3-26.16.1.noarch", "HPE Helion OpenStack 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud 9:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud Crowbar 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud Crowbar 9:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-libs0-5.1.3-26.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41991", "url": "https://www.suse.com/security/cve/CVE-2021-41991" }, { "category": "external", "summary": "SUSE Bug 1191367 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191367" }, { "category": "external", "summary": "SUSE Bug 1191435 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191435" }, { "category": "external", "summary": "SUSE Bug 1192640 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1192640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:strongswan-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-doc-5.1.3-26.16.1.noarch", "HPE Helion OpenStack 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud 9:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud Crowbar 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud Crowbar 9:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-libs0-5.1.3-26.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:strongswan-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-doc-5.1.3-26.16.1.noarch", "HPE Helion OpenStack 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud 9:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud Crowbar 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud Crowbar 9:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-libs0-5.1.3-26.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-19T11:16:54Z", "details": "important" } ], "title": "CVE-2021-41991" } ] }
fkie_cve-2021-41991
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE9611E9-41E8-4C83-BB26-E52C35252022", "versionEndExcluding": "5.9.4", "versionStartIncluding": "4.2.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinema_remote_connect_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "276E81AE-85C3-4DBA-B4E6-0BFD85DE03F5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "18A57CBB-1089-4829-AD1E-89C927611A36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF3E5DDA-1BD4-4511-A2C8-4B5D40E6755E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "373B769D-0E60-4362-BAE1-90BA6E0B211C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA9BB25C-D5E3-43DE-8C73-06BDC43CA960", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "049460B8-6186-44F9-B41F-284A2EC0B3B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "205482DA-548C-4757-91F0-1599438873BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2009C1FA-96D5-413C-9161-0DB55F841088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*", "matchCriteriaId": "350FD323-C876-4C7A-A2E7-4B0660C87F6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_sc632-2c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FF3D204-F783-4ED8-B6DC-7BAE65AB5E89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_sc632-2c:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A79836B-5EC1-40AF-8A57-9657EF6758E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16B3F1A4-6AA2-48C4-B2B3-7CCFED8E35B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec:-:*:*:*:*:*:*:*", "matchCriteriaId": "A60FC550-A518-46BF-9124-E21DD654981C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:cp_1543-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E64DDA-3855-4CDB-A42C-EE23FEDA9074", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "F703FF33-882F-4CB5-9CA0-8FAE670B2AEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A46FF27-6B0D-4606-9D7B-45912556416F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "1256EB4B-DD8A-4F99-AE69-F74E8F789C63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01483C0C-8A8D-4059-B4F6-D280A71178B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_cp_1543sp-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "843A8686-5172-4782-BB97-B5D3C6FB27A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_eu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "80303992-FA4F-4F53-8A52-BF2E2BFB99A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:*", "matchCriteriaId": "209C7B1E-10F6-4215-AF69-CC36192E0FCE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_cp_1243-7_lte\\/us_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1D78E94-D826-4300-BD3D-E544A1D67B0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_cp_1243-7_lte\\/us:-:*:*:*:*:*:*:*", "matchCriteriaId": "00DDA679-D761-4986-A0A0-4C00178DF0B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_cp_1542sp-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7F1C19F-FCF8-4BB5-BDAE-F7B188A85A1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_cp_1542sp-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C868560-8BAE-462D-AED0-3C52EA9B6DB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_sc636-2c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "50CB213E-50AC-418F-A4CF-AEE1E0D74E00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_sc636-2c:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB9BD17-7F1F-42E9-831F-EB907F9BC214", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33C9CC6-C03E-47CA-9B8F-96C05C5A4DEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_cp_1542sp-1_irc:-:*:*:*:*:*:*:*", "matchCriteriaId": "E362CEA5-F47B-4294-8F2D-A0A7AC6FF390", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_sc642-2c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBCABEAA-F652-4DB4-89F9-19C6C3B7FB11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_sc642-2c:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C7D54A-27B4-4195-8131-DD5380472A75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "656082A8-8160-4A1A-967B-F7CC27A218D5", "versionEndExcluding": "2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_sc646-2c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E54AF1E6-0E52-447C-8946-18716D30EBE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_sc622-2c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC252750-1EFC-4AA3-9477-A49E3BBD61F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_sc622-2c:-:*:*:*:*:*:*:*", "matchCriteriaId": "50FEE5FA-B141-4E5F-8673-363089262530", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_rail_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "934FCA36-A4F2-4B90-93DE-48A3A355D865", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1_rail:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A294530-727C-4535-8B02-668DF74587D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "425AB6D7-7325-4028-9065-D24C597BEB62", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9E746CF-4009-4A14-8916-A9E0276CAF8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A48B4A9-F8D3-433F-A95B-B541C13FF2C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D7AB0D5-FD3E-416A-975B-D212B3350433", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "336471A8-D4AF-4935-B170-DAB2267C61DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail:-:*:*:*:*:*:*:*", "matchCriteriaId": "25634AD2-2CC0-45AF-B5DE-39D30CBA91A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility." }, { "lang": "es", "value": "La cach\u00e9 de certificados en memoria en strongSwan versiones anteriores a 5.9.4, presenta un desbordamiento de enteros remoto al recibir muchas peticiones con diferentes certificados para llenar la cach\u00e9 y posteriormente desencadenar la sustituci\u00f3n de las entradas de la cach\u00e9. El c\u00f3digo intenta seleccionar una entrada de cach\u00e9 menos usada mediante un generador de n\u00fameros aleatorios, pero esto no es realizado correctamente. Una ejecuci\u00f3n de c\u00f3digo remota podr\u00eda ser una peque\u00f1a posibilidad" } ], "id": "CVE-2021-41991", "lastModified": "2024-11-21T06:27:02.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-18T14:15:10.333", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/strongswan/strongswan/releases/tag/5.9.4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4989" }, { "source": "cve@mitre.org", "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/strongswan/strongswan/releases/tag/5.9.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4989" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
WID-SEC-W-2024-1024
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Strongswan ist eine IPSec-basierte VPN Implementierung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in strongSwan ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1024 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2024-1024.json" }, { "category": "self", "summary": "WID-SEC-2024-1024 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1024" }, { "category": "external", "summary": "strongSwan Security Advisory vom 2021-10-18", "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41990).html" }, { "category": "external", "summary": "strongSwan Security Advisory vom 2021-10-18", "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5111-1 vom 2021-10-19", "url": "https://ubuntu.com/security/notices/USN-5111-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3468-1 vom 2021-10-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009611.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14827-1 vom 2021-10-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009612.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3467-1 vom 2021-10-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009613.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3469-1 vom 2021-10-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009614.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5111-2 vom 2021-10-19", "url": "https://ubuntu.com/security/notices/USN-5111-2" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-08 vom 2024-05-04", "url": "https://security.gentoo.org/glsa/202405-08" } ], "source_lang": "en-US", "title": "strongSwan: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2024-05-05T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:08:29.232+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1024", "initial_release_date": "2021-10-18T22:00:00.000+00:00", "revision_history": [ { "date": "2021-10-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-10-19T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2021-10-21T22:00:00.000+00:00", "number": "3", "summary": "Referenz(en) aufgenommen: FEDORA-2021-0B37146973, FEDORA-2021-95FAB6A482, FEDORA-2021-B3DF83339E" }, { "date": "2024-05-05T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Gentoo aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c5.9.4", "product": { "name": "Open Source strongSwan \u003c5.9.4", "product_id": "T020654" } } ], "category": "product_name", "name": "strongSwan" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41990", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in strongSwan. RSASSA-PSS-Signaturen, deren Parameter eine sehr hohe Salt l\u00e4nge definieren, k\u00f6nnen einen Integer-\u00dcberlauf ausl\u00f6sen, der zu einem Segmentierungsfehler f\u00fchrt. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "T000126", "T012167" ] }, "release_date": "2021-10-18T22:00:00.000+00:00", "title": "CVE-2021-41990" }, { "cve": "CVE-2021-41991", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in strongSwan. Sobald der speicherinterne Zertifikats-Cache voll ist, wird versucht, weniger genutzte Eintr\u00e4ge zuf\u00e4llig zu ersetzen, was abh\u00e4ngig vom generierten Zufallswert zu einem Integer-\u00dcberlauf f\u00fchren kann. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "T000126", "T012167" ] }, "release_date": "2021-10-18T22:00:00.000+00:00", "title": "CVE-2021-41991" } ] }
wid-sec-w-2024-1024
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Strongswan ist eine IPSec-basierte VPN Implementierung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in strongSwan ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1024 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2024-1024.json" }, { "category": "self", "summary": "WID-SEC-2024-1024 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1024" }, { "category": "external", "summary": "strongSwan Security Advisory vom 2021-10-18", "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41990).html" }, { "category": "external", "summary": "strongSwan Security Advisory vom 2021-10-18", "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5111-1 vom 2021-10-19", "url": "https://ubuntu.com/security/notices/USN-5111-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3468-1 vom 2021-10-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009611.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14827-1 vom 2021-10-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009612.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3467-1 vom 2021-10-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009613.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3469-1 vom 2021-10-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009614.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5111-2 vom 2021-10-19", "url": "https://ubuntu.com/security/notices/USN-5111-2" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-08 vom 2024-05-04", "url": "https://security.gentoo.org/glsa/202405-08" } ], "source_lang": "en-US", "title": "strongSwan: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2024-05-05T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:08:29.232+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1024", "initial_release_date": "2021-10-18T22:00:00.000+00:00", "revision_history": [ { "date": "2021-10-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-10-19T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2021-10-21T22:00:00.000+00:00", "number": "3", "summary": "Referenz(en) aufgenommen: FEDORA-2021-0B37146973, FEDORA-2021-95FAB6A482, FEDORA-2021-B3DF83339E" }, { "date": "2024-05-05T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Gentoo aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c5.9.4", "product": { "name": "Open Source strongSwan \u003c5.9.4", "product_id": "T020654" } } ], "category": "product_name", "name": "strongSwan" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41990", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in strongSwan. RSASSA-PSS-Signaturen, deren Parameter eine sehr hohe Salt l\u00e4nge definieren, k\u00f6nnen einen Integer-\u00dcberlauf ausl\u00f6sen, der zu einem Segmentierungsfehler f\u00fchrt. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "T000126", "T012167" ] }, "release_date": "2021-10-18T22:00:00.000+00:00", "title": "CVE-2021-41990" }, { "cve": "CVE-2021-41991", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in strongSwan. Sobald der speicherinterne Zertifikats-Cache voll ist, wird versucht, weniger genutzte Eintr\u00e4ge zuf\u00e4llig zu ersetzen, was abh\u00e4ngig vom generierten Zufallswert zu einem Integer-\u00dcberlauf f\u00fchren kann. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "T000126", "T012167" ] }, "release_date": "2021-10-18T22:00:00.000+00:00", "title": "CVE-2021-41991" } ] }
icsa-25-259-03
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to cause a denial-of-service (DoS) condition in the affected devices by exploiting integer overflow bugs.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Do not click web links or open attachments in unsolicited email messages.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-25-259-03 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-259-03.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-25-259-03 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-259-03" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC NET CP, SINEMA and SCALANCE", "tracking": { "current_release_date": "2025-09-16T06:00:00.000000Z", "generator": { "date": "2025-09-16T18:06:54.469507Z", "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-25-259-03", "initial_release_date": "2025-09-16T06:00:00.000000Z", "revision_history": [ { "date": "2025-09-16T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2): \u003cV7.1", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Siemens RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE M874-3 (6GK5874-3AA00-2AA2): \u003cV7.1", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Siemens SCALANCE M874-3 (6GK5874-3AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2): \u003cV7.1", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Siemens SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2): \u003cV7.1", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Siemens SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2): \u003cV7.1", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Siemens SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2): \u003cV7.1", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Siemens SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1): \u003cV7.1", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "Siemens SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1): \u003cV7.1", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "Siemens SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1): \u003cV7.1", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "Siemens SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE S615 (6GK5615-0AA00-2AA2): \u003cV7.1", "product_id": "CSAFPID-0010" } } ], "category": "product_name", "name": "Siemens SCALANCE S615 (6GK5615-0AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "Siemens Siemens SCALANCE SC622-2C (6GK5622-2GS00-2AC2): \u003cV2.3", "product_id": "CSAFPID-0011" } } ], "category": "product_name", "name": "Siemens SCALANCE SC622-2C (6GK5622-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2): \u003cV7.1", "product_id": "CSAFPID-0012" } } ], "category": "product_name", "name": "Siemens RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "Siemens Siemens SCALANCE SC632-2C (6GK5632-2GS00-2AC2): \u003cV2.3", "product_id": "CSAFPID-0013" } } ], "category": "product_name", "name": "Siemens SCALANCE SC632-2C (6GK5632-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "Siemens Siemens SCALANCE SC636-2C (6GK5636-2GS00-2AC2): \u003cV2.3", "product_id": "CSAFPID-0014" } } ], "category": "product_name", "name": "Siemens SCALANCE SC636-2C (6GK5636-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "Siemens Siemens SCALANCE SC642-2C (6GK5642-2GS00-2AC2): \u003cV2.3", "product_id": "CSAFPID-0015" } } ], "category": "product_name", "name": "Siemens SCALANCE SC642-2C (6GK5642-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "Siemens Siemens SCALANCE SC646-2C (6GK5646-2GS00-2AC2): \u003cV2.3", "product_id": "CSAFPID-0016" } } ], "category": "product_name", "name": "Siemens SCALANCE SC646-2C (6GK5646-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3.46", "product": { "name": "Siemens Siemens SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0): \u003cV3.3.46", "product_id": "CSAFPID-0017" } } ], "category": "product_name", "name": "Siemens SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3.46", "product": { "name": "Siemens Siemens SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0): \u003cV3.3.46", "product_id": "CSAFPID-0018" } } ], "category": "product_name", "name": "Siemens SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3.46", "product": { "name": "Siemens Siemens SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0): \u003cV3.3.46", "product_id": "CSAFPID-0019" } } ], "category": "product_name", "name": "Siemens SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3.46", "product": { "name": "Siemens Siemens SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0): \u003cV3.3.46", "product_id": "CSAFPID-0020" } } ], "category": "product_name", "name": "Siemens SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3.46", "product": { "name": "Siemens Siemens SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0): \u003cV3.3.46", "product_id": "CSAFPID-0021" } } ], "category": "product_name", "name": "Siemens SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "Siemens Siemens SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0): \u003cV2.2.28", "product_id": "CSAFPID-0022" } } ], "category": "product_name", "name": "Siemens SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE M804PB (6GK5804-0AP00-2AA2): \u003cV7.1", "product_id": "CSAFPID-0023" } } ], "category": "product_name", "name": "Siemens SCALANCE M804PB (6GK5804-0AP00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "Siemens Siemens SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0): \u003cV2.2.28", "product_id": "CSAFPID-0024" } } ], "category": "product_name", "name": "Siemens SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "Siemens Siemens SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0): \u003cV2.2.28", "product_id": "CSAFPID-0025" } } ], "category": "product_name", "name": "Siemens SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "Siemens Siemens SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0): \u003cV2.2.28", "product_id": "CSAFPID-0026" } } ], "category": "product_name", "name": "Siemens SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV1.1", "product": { "name": "Siemens Siemens SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0): \u003cV1.1", "product_id": "CSAFPID-0027" } } ], "category": "product_name", "name": "Siemens SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.1", "product": { "name": "Siemens Siemens SINEMA Remote Connect Server: \u003cV3.1", "product_id": "CSAFPID-0028" } } ], "category": "product_name", "name": "Siemens SINEMA Remote Connect Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "Siemens Siemens SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0): \u003cV2.2.28", "product_id": "CSAFPID-0029" } } ], "category": "product_name", "name": "Siemens SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "Siemens Siemens SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0): \u003cV2.2.28", "product_id": "CSAFPID-0030" } } ], "category": "product_name", "name": "Siemens SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "Siemens Siemens SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0): \u003cV2.2.28", "product_id": "CSAFPID-0031" } } ], "category": "product_name", "name": "Siemens SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3.46", "product": { "name": "Siemens Siemens SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0): \u003cV3.3.46", "product_id": "CSAFPID-0032" } } ], "category": "product_name", "name": "Siemens SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.22", "product": { "name": "Siemens Siemens SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0): \u003cV3.0.22", "product_id": "CSAFPID-0033" } } ], "category": "product_name", "name": "Siemens SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2): \u003cV7.1", "product_id": "CSAFPID-0034" } } ], "category": "product_name", "name": "Siemens SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3.46", "product": { "name": "Siemens Siemens SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0): \u003cV3.3.46", "product_id": "CSAFPID-0035" } } ], "category": "product_name", "name": "Siemens SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3.46", "product": { "name": "Siemens Siemens SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0): \u003cV3.3.46", "product_id": "CSAFPID-0036" } } ], "category": "product_name", "name": "Siemens SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2): \u003cV7.1", "product_id": "CSAFPID-0037" } } ], "category": "product_name", "name": "Siemens SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2): \u003cV7.1", "product_id": "CSAFPID-0038" } } ], "category": "product_name", "name": "Siemens SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2): \u003cV7.1", "product_id": "CSAFPID-0039" } } ], "category": "product_name", "name": "Siemens SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2): \u003cV7.1", "product_id": "CSAFPID-0040" } } ], "category": "product_name", "name": "Siemens SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.1", "product": { "name": "Siemens Siemens SCALANCE M874-2 (6GK5874-2AA00-2AA2): \u003cV7.1", "product_id": "CSAFPID-0041" } } ], "category": "product_name", "name": "Siemens SCALANCE M874-2 (6GK5874-2AA00-2AA2)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41990", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The gmp plugin in strongSwan before version 5.9.4 has a remote integer overflow vulnerability via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0012", "CSAFPID-0023", "CSAFPID-0034", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41990" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0012", "CSAFPID-0023", "CSAFPID-0034", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ] }, { "category": "mitigation", "details": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2), SCALANCE M804PB (6GK5804-0AP00-2AA2), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2), SCALANCE M874-2 (6GK5874-2AA00-2AA2), SCALANCE M874-3 (6GK5874-3AA00-2AA2), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1), SCALANCE S615 (6GK5615-0AA00-2AA2): Update to V7.1 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0012", "CSAFPID-0023", "CSAFPID-0034", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109807276/" }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0012", "CSAFPID-0023", "CSAFPID-0034", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0012", "CSAFPID-0023", "CSAFPID-0034", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-539476 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0012", "CSAFPID-0023", "CSAFPID-0034", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-539476.html" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-539476 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0012", "CSAFPID-0023", "CSAFPID-0034", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-539476.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0012", "CSAFPID-0023", "CSAFPID-0034", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ] } ] }, { "cve": "CVE-2021-41991", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The in-memory certificate cache in strongSwan before version 5.9.4 has a remote integer overflow vulnerability upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. This could lead to a denial of service (DoS) condition. Remote code execution can\u0027t be excluded completely, but it would require attackers to have control over the dereferenced memory, so it is very unlikely.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41991" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ] }, { "category": "mitigation", "details": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2), SCALANCE M804PB (6GK5804-0AP00-2AA2), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2), SCALANCE M874-2 (6GK5874-2AA00-2AA2), SCALANCE M874-3 (6GK5874-3AA00-2AA2), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1), SCALANCE S615 (6GK5615-0AA00-2AA2): Update to V7.1 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109807276/" }, { "category": "mitigation", "details": "(CVE-2021-41991) SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0), SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0), SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0), SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0), SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0), SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0), SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0), SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0), SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0), SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0): Only deploy certificates via TIA portal that got created with TIA portal", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ] }, { "category": "mitigation", "details": "(CVE-2021-41991) SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0): Update to V2.2.28 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817067/" }, { "category": "mitigation", "details": "(CVE-2021-41991) SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0), SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0), SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0), SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0), SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0), SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0), SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0): Update to V3.3.46 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812218/" }, { "category": "mitigation", "details": "(CVE-2021-41991) SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0): Update to V1.1 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811116/" }, { "category": "mitigation", "details": "(CVE-2021-41991) SINEMA Remote Connect Server: Update to V3.1 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811169/" }, { "category": "mitigation", "details": "(CVE-2021-41991) SCALANCE SC622-2C (6GK5622-2GS00-2AC2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2): Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109805907/" }, { "category": "mitigation", "details": "(CVE-2021-41991) SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0), SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0): Update to V3.0.22 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109808678/" }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-539476 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-539476.html" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-539476 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ], "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-539476.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041" ] } ] } ] }
gsd-2021-41991
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2021-41991", "description": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", "id": "GSD-2021-41991", "references": [ "https://www.suse.com/security/cve/CVE-2021-41991.html", "https://www.debian.org/security/2021/dsa-4989", "https://ubuntu.com/security/CVE-2021-41991", "https://security.archlinux.org/CVE-2021-41991" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-41991" ], "details": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", "id": "GSD-2021-41991", "modified": "2023-12-13T01:23:27.370626Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41991", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/strongswan/strongswan/releases/tag/5.9.4", "refsource": "MISC", "url": "https://github.com/strongswan/strongswan/releases/tag/5.9.4" }, { "name": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html", "refsource": "CONFIRM", "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html" }, { "name": "DSA-4989", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4989" }, { "name": "[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html" }, { "name": "FEDORA-2021-0b37146973", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/" }, { "name": "FEDORA-2021-b3df83339e", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/" }, { "name": "FEDORA-2021-95fab6a482", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.9.4", "versionStartIncluding": "4.2.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sinema_remote_connect_server:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_sc632-2c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_sc632-2c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:cp_1543-1_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_cp_1543sp-1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_eu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_cp_1243-7_lte\\/us_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_cp_1243-7_lte\\/us:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_cp_1542sp-1_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_cp_1542sp-1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_sc636-2c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_sc636-2c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_cp_1542sp-1_irc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_sc642-2c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_sc642-2c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_sc646-2c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_sc622-2c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_sc622-2c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_rail_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1_rail:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41991" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html", "refsource": "CONFIRM", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html" }, { "name": "https://github.com/strongswan/strongswan/releases/tag/5.9.4", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/strongswan/strongswan/releases/tag/5.9.4" }, { "name": "DSA-4989", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4989" }, { "name": "[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html" }, { "name": "FEDORA-2021-b3df83339e", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/" }, { "name": "FEDORA-2021-0b37146973", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/" }, { "name": "FEDORA-2021-95fab6a482", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-04-12T18:42Z", "publishedDate": "2021-10-18T14:15Z" } } }
ghsa-jpr7-w98h-cvgm
Vulnerability from github
The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.
{ "affected": [], "aliases": [ "CVE-2021-41991" ], "database_specific": { "cwe_ids": [ "CWE-190" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-10-18T14:15:00Z", "severity": "HIGH" }, "details": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", "id": "GHSA-jpr7-w98h-cvgm", "modified": "2022-05-24T19:17:46Z", "published": "2022-05-24T19:17:46Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41991" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf" }, { "type": "WEB", "url": "https://github.com/strongswan/strongswan/releases/tag/5.9.4" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4" }, { "type": "WEB", "url": "https://www.debian.org/security/2021/dsa-4989" }, { "type": "WEB", "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
var-202110-1670
Vulnerability from variot
The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility. strongSwan Exists in an integer overflow vulnerability.Denial of service (DoS) It may be put into a state. ========================================================================== Ubuntu Security Notice USN-5111-1 October 19, 2021
strongswan vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.10
- Ubuntu 21.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in strongSwan.
Software Description: - strongswan: IPsec VPN solution
Details:
It was discovered that strongSwan incorrectly handled certain RSASSA-PSS signatures. A remote attacker could use this issue to cause strongSwan to crash, resulting in a denial of service. (CVE-2021-41990)
It was discovered that strongSwan incorrectly handled replacing certificates in the cache. A remote attacker could use this issue to cause strongSwan to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-41991)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.10: libstrongswan 5.9.1-1ubuntu3.1 strongswan 5.9.1-1ubuntu3.1
Ubuntu 21.04: libstrongswan 5.9.1-1ubuntu1.2 strongswan 5.9.1-1ubuntu1.2
Ubuntu 20.04 LTS: libstrongswan 5.8.2-1ubuntu3.3 strongswan 5.8.2-1ubuntu3.3
Ubuntu 18.04 LTS: libstrongswan 5.6.2-1ubuntu2.7 strongswan 5.6.2-1ubuntu2.7
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-5111-1 CVE-2021-41990, CVE-2021-41991
Package Information: https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu3.1 https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu1.2 https://launchpad.net/ubuntu/+source/strongswan/5.8.2-1ubuntu3.3 https://launchpad.net/ubuntu/+source/strongswan/5.6.2-1ubuntu2.7 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-4989-1 security@debian.org https://www.debian.org/security/ Yves-Alexis Perez October 18, 2021 https://www.debian.org/security/faq
Package : strongswan CVE ID : CVE-2021-41990 CVE-2021-41991
Researchers at the United States of America National Security Agency (NSA) identified two denial of services vulnerability in strongSwan, an IKE/IPsec suite.
CVE-2021-41990
RSASSA-PSS signatures whose parameters define a very high salt length can
trigger an integer overflow that can lead to a segmentation fault.
Generating a signature that bypasses the padding check to trigger the crash
requires access to the private key that signed the certificate. However,
the certificate does not have to be trusted. Because the gmp and the
openssl plugins both check if a parsed certificate is self-signed (and the
signature is valid), this can e.g. be triggered by an unrelated
self-signed CA certificate sent by an initiator. Depending on the generated random value, this could
lead to an integer overflow that results in a double-dereference and a call
using out-of-bounds memory that most likely leads to a segmentation fault.
Remote code execution can't be ruled out completely, but attackers have no
control over the dereferenced memory, so it seems unlikely at this point.
For the oldstable distribution (buster), these problems have been fixed in version 5.7.2-1+deb10u1.
For the stable distribution (bullseye), these problems have been fixed in version 5.9.1-1+deb11u1.
We recommend that you upgrade your strongswan packages.
For the detailed security status of strongswan please refer to its security tracker page at: https://security-tracker.debian.org/tracker/strongswan
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAmFtyAUACgkQ3rYcyPpX RFudiwf+NNcRRRJychLI5ycMKVxkr2tEAJDeVZjv966YBM1tXnCtROydXf5Zip2M dn/EYO71uuT5FKhs8tJyx5iv2bFcrvyqQQo6DFQvXZHR0+9U+MHcR9qB7JJDM4nK +JXOEmAv3akCFhiP6jMx5B6jRWR1e4MOwxmgrgGu/nwy2cYBQPI43qPTrXi3Fcnv eSgeyLqyZNLmaGmj8jQfTnc8bdVF5xAs6mHhVqNJxQCdouG9b4/S6AxJsl3IMxyF WZhtCNUvhHH8wz0lZVElR3Qs6fUu0phKdlT9kBv/o6fP3ceiYOCEh8SqBgYU3hQL xyB0uP4EcSR70TvKZMB2jV/tGG1A8w== =/Xvi -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202405-08
https://security.gentoo.org/
Severity: Normal Title: strongSwan: Multiple Vulnerabilities Date: May 04, 2024 Bugs: #818841, #832460, #878887, #899964 ID: 202405-08
Synopsis
Multiple vulnerabilities have been discovered in strongSwan, the worst of which could possibly lead to remote code execution.
Background
strongSwan is an IPSec implementation for Linux.
Affected packages
Package Vulnerable Unaffected
net-vpn/strongswan < 5.9.10 >= 5.9.10
Description
Multiple vulnerabilities have been discovered in strongSwan. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All strongSwan users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-vpn/strongswan-5.9.10"
References
[ 1 ] CVE-2021-41991 https://nvd.nist.gov/vuln/detail/CVE-2021-41991 [ 2 ] CVE-2021-45079 https://nvd.nist.gov/vuln/detail/CVE-2021-45079 [ 3 ] CVE-2022-40617 https://nvd.nist.gov/vuln/detail/CVE-2022-40617 [ 4 ] CVE-2023-26463 https://nvd.nist.gov/vuln/detail/CVE-2023-26463
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202405-08
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1670", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "siplus net cp 1543-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siplus s7-1200 cp 1243-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc636-2c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc622-2c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "34" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "35" }, { "model": "strongswan", "scope": "lt", "trust": 1.0, "vendor": "strongswan", "version": "5.9.4" }, { "model": "simatic net cp 1243-8 irc", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siplus et 200sp cp 1542sp-1 irc tx rail", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "11.0" }, { "model": "simatic net cp1243-7 lte eu", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic cp 1243-7 lte\\/us", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic cp 1543sp-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "scalance sc642-2c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siplus et 200sp cp 1543sp-1 isec tx rail", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic cp 1542sp-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic cp 1542sp-1 irc", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "cp 1543-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "33" }, { "model": "simatic cp 1242-7 gprs v2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic net cp 1545-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siplus s7-1200 cp 1243-1 rail", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "sinema remote connect server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic cp 1243-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc632-2c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc646-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "siplus et 200sp cp 1543sp-1 isec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "strongswan", "scope": "gte", "trust": 1.0, "vendor": "strongswan", "version": "4.2.10" }, { "model": "fedora", "scope": null, "trust": 0.8, "vendor": "fedora", "version": null }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "strongswan", "scope": null, "trust": 0.8, "vendor": "strongswan", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007493" }, { "db": "NVD", "id": "CVE-2021-41991" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu", "sources": [ { "db": "PACKETSTORM", "id": "164558" }, { "db": "PACKETSTORM", "id": "164554" } ], "trust": 0.2 }, "cve": "CVE-2021-41991", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-41991", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-403107", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-41991", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-41991", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-41991", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-41991", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-1214", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-403107", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-41991", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-403107" }, { "db": "VULMON", "id": "CVE-2021-41991" }, { "db": "JVNDB", "id": "JVNDB-2021-007493" }, { "db": "CNNVD", "id": "CNNVD-202110-1214" }, { "db": "NVD", "id": "CVE-2021-41991" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility. strongSwan Exists in an integer overflow vulnerability.Denial of service (DoS) It may be put into a state. ==========================================================================\nUbuntu Security Notice USN-5111-1\nOctober 19, 2021\n\nstrongswan vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 21.10\n- Ubuntu 21.04\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in strongSwan. \n\nSoftware Description:\n- strongswan: IPsec VPN solution\n\nDetails:\n\nIt was discovered that strongSwan incorrectly handled certain RSASSA-PSS\nsignatures. A remote attacker could use this issue to cause strongSwan to\ncrash, resulting in a denial of service. (CVE-2021-41990)\n\nIt was discovered that strongSwan incorrectly handled replacing\ncertificates in the cache. A remote attacker could use this issue to cause\nstrongSwan to crash, resulting in a denial of service, or possibly execute\narbitrary code. (CVE-2021-41991)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 21.10:\n libstrongswan 5.9.1-1ubuntu3.1\n strongswan 5.9.1-1ubuntu3.1\n\nUbuntu 21.04:\n libstrongswan 5.9.1-1ubuntu1.2\n strongswan 5.9.1-1ubuntu1.2\n\nUbuntu 20.04 LTS:\n libstrongswan 5.8.2-1ubuntu3.3\n strongswan 5.8.2-1ubuntu3.3\n\nUbuntu 18.04 LTS:\n libstrongswan 5.6.2-1ubuntu2.7\n strongswan 5.6.2-1ubuntu2.7\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n https://ubuntu.com/security/notices/USN-5111-1\n CVE-2021-41990, CVE-2021-41991\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu3.1\n https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu1.2\n https://launchpad.net/ubuntu/+source/strongswan/5.8.2-1ubuntu3.3\n https://launchpad.net/ubuntu/+source/strongswan/5.6.2-1ubuntu2.7\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4989-1 security@debian.org\nhttps://www.debian.org/security/ Yves-Alexis Perez\nOctober 18, 2021 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : strongswan\nCVE ID : CVE-2021-41990 CVE-2021-41991\n\nResearchers at the United States of America National Security Agency (NSA)\nidentified two denial of services vulnerability in strongSwan, an IKE/IPsec\nsuite. \n\nCVE-2021-41990\n\n RSASSA-PSS signatures whose parameters define a very high salt length can\n trigger an integer overflow that can lead to a segmentation fault. \n Generating a signature that bypasses the padding check to trigger the crash\n requires access to the private key that signed the certificate. However,\n the certificate does not have to be trusted. Because the gmp and the\n openssl plugins both check if a parsed certificate is self-signed (and the\n signature is valid), this can e.g. be triggered by an unrelated\n self-signed CA certificate sent by an initiator. Depending on the generated random value, this could\n lead to an integer overflow that results in a double-dereference and a call\n using out-of-bounds memory that most likely leads to a segmentation fault. \n Remote code execution can\u0027t be ruled out completely, but attackers have no\n control over the dereferenced memory, so it seems unlikely at this point. \n\nFor the oldstable distribution (buster), these problems have been fixed\nin version 5.7.2-1+deb10u1. \n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 5.9.1-1+deb11u1. \n\nWe recommend that you upgrade your strongswan packages. \n\nFor the detailed security status of strongswan please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/strongswan\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n\niQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAmFtyAUACgkQ3rYcyPpX\nRFudiwf+NNcRRRJychLI5ycMKVxkr2tEAJDeVZjv966YBM1tXnCtROydXf5Zip2M\ndn/EYO71uuT5FKhs8tJyx5iv2bFcrvyqQQo6DFQvXZHR0+9U+MHcR9qB7JJDM4nK\n+JXOEmAv3akCFhiP6jMx5B6jRWR1e4MOwxmgrgGu/nwy2cYBQPI43qPTrXi3Fcnv\neSgeyLqyZNLmaGmj8jQfTnc8bdVF5xAs6mHhVqNJxQCdouG9b4/S6AxJsl3IMxyF\nWZhtCNUvhHH8wz0lZVElR3Qs6fUu0phKdlT9kBv/o6fP3ceiYOCEh8SqBgYU3hQL\nxyB0uP4EcSR70TvKZMB2jV/tGG1A8w==\n=/Xvi\n-----END PGP SIGNATURE-----\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202405-08\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: strongSwan: Multiple Vulnerabilities\n Date: May 04, 2024\n Bugs: #818841, #832460, #878887, #899964\n ID: 202405-08\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n=======\nMultiple vulnerabilities have been discovered in strongSwan, the worst\nof which could possibly lead to remote code execution. \n\nBackground\n=========\nstrongSwan is an IPSec implementation for Linux. \n\nAffected packages\n================\nPackage Vulnerable Unaffected\n------------------ ------------ ------------\nnet-vpn/strongswan \u003c 5.9.10 \u003e= 5.9.10\n\nDescription\n==========\nMultiple vulnerabilities have been discovered in strongSwan. Please\nreview the CVE identifiers referenced below for details. \n\nImpact\n=====\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n=========\nThere is no known workaround at this time. \n\nResolution\n=========\nAll strongSwan users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-vpn/strongswan-5.9.10\"\n\nReferences\n=========\n[ 1 ] CVE-2021-41991\n https://nvd.nist.gov/vuln/detail/CVE-2021-41991\n[ 2 ] CVE-2021-45079\n https://nvd.nist.gov/vuln/detail/CVE-2021-45079\n[ 3 ] CVE-2022-40617\n https://nvd.nist.gov/vuln/detail/CVE-2022-40617\n[ 4 ] CVE-2023-26463\n https://nvd.nist.gov/vuln/detail/CVE-2023-26463\n\nAvailability\n===========\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202405-08\n\nConcerns?\n========\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n======\nCopyright 2024 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2021-41991" }, { "db": "JVNDB", "id": "JVNDB-2021-007493" }, { "db": "VULHUB", "id": "VHN-403107" }, { "db": "VULMON", "id": "CVE-2021-41991" }, { "db": "PACKETSTORM", "id": "164558" }, { "db": "PACKETSTORM", "id": "164554" }, { "db": "PACKETSTORM", "id": "169143" }, { "db": "PACKETSTORM", "id": "178454" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-41991", "trust": 3.8 }, { "db": "SIEMENS", "id": "SSA-539476", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU98748974", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-007493", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "164558", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "164554", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021101947", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3463", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3488", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202110-1214", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-403107", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-41991", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169143", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "178454", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-403107" }, { "db": "VULMON", "id": "CVE-2021-41991" }, { "db": "JVNDB", "id": "JVNDB-2021-007493" }, { "db": "PACKETSTORM", "id": "164558" }, { "db": "PACKETSTORM", "id": "164554" }, { "db": "PACKETSTORM", "id": "169143" }, { "db": "PACKETSTORM", "id": "178454" }, { "db": "CNNVD", "id": "CNNVD-202110-1214" }, { "db": "NVD", "id": "CVE-2021-41991" } ] }, "id": "VAR-202110-1670", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-403107" } ], "trust": 0.7521640566666667 }, "last_update_date": "2024-11-23T20:22:32.248000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "strongSwan\u00a0Vulnerability\u00a0(CVE-2021-41991)", "trust": 0.8, "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html" }, { "title": "strongSwan Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=166640" }, { "title": "Debian Security Advisories: DSA-4989-1 strongswan -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=35fdad388753f5d88f528a33acdb09b3" }, { "title": "Red Hat: CVE-2021-41991", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2021-41991" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2021-41991 log" } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-41991" }, { "db": "JVNDB", "id": "JVNDB-2021-007493" }, { "db": "CNNVD", "id": "CNNVD-202110-1214" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-403107" }, { "db": "JVNDB", "id": "JVNDB-2021-007493" }, { "db": "NVD", "id": "CVE-2021-41991" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://www.debian.org/security/2021/dsa-4989" }, { "trust": 1.8, "url": "https://github.com/strongswan/strongswan/releases/tag/5.9.4" }, { "trust": 1.8, "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html" }, { "trust": 1.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41991" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf" }, { "trust": 1.1, "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/wqsq3bec22nf4ncdzvct4p3q2ziajxgj/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/y3tq32jljobjdb2ejksx2pbpb5nfg2d4/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5fjsatd2r2xhtg4p63gcmq2n7ewkmme5/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu98748974/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5fjsatd2r2xhtg4p63gcmq2n7ewkmme5/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/y3tq32jljobjdb2ejksx2pbpb5nfg2d4/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/wqsq3bec22nf4ncdzvct4p3q2ziajxgj/" }, { "trust": 0.7, "url": "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2021-41991" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/strongswan-integer-overflow-via-in-memory-certificate-cache-36667" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3463" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164558/ubuntu-security-notice-usn-5111-2.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021101947" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3488" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164554/ubuntu-security-notice-usn-5111-1.html" }, { "trust": 0.2, "url": "https://ubuntu.com/security/notices/usn-5111-1" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41990" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/190.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5111-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu3.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/strongswan/5.8.2-1ubuntu3.3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu1.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/strongswan/5.6.2-1ubuntu2.7" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/strongswan" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-45079" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://security.gentoo.org/glsa/202405-08" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-40617" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-26463" } ], "sources": [ { "db": "VULHUB", "id": "VHN-403107" }, { "db": "VULMON", "id": "CVE-2021-41991" }, { "db": "JVNDB", "id": "JVNDB-2021-007493" }, { "db": "PACKETSTORM", "id": "164558" }, { "db": "PACKETSTORM", "id": "164554" }, { "db": "PACKETSTORM", "id": "169143" }, { "db": "PACKETSTORM", "id": "178454" }, { "db": "CNNVD", "id": "CNNVD-202110-1214" }, { "db": "NVD", "id": "CVE-2021-41991" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-403107" }, { "db": "VULMON", "id": "CVE-2021-41991" }, { "db": "JVNDB", "id": "JVNDB-2021-007493" }, { "db": "PACKETSTORM", "id": "164558" }, { "db": "PACKETSTORM", "id": "164554" }, { "db": "PACKETSTORM", "id": "169143" }, { "db": "PACKETSTORM", "id": "178454" }, { "db": "CNNVD", "id": "CNNVD-202110-1214" }, { "db": "NVD", "id": "CVE-2021-41991" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-18T00:00:00", "db": "VULHUB", "id": "VHN-403107" }, { "date": "2021-10-18T00:00:00", "db": "VULMON", "id": "CVE-2021-41991" }, { "date": "2022-02-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007493" }, { "date": "2021-10-20T15:43:57", "db": "PACKETSTORM", "id": "164558" }, { "date": "2021-10-19T15:31:42", "db": "PACKETSTORM", "id": "164554" }, { "date": "2021-10-28T19:12:00", "db": "PACKETSTORM", "id": "169143" }, { "date": "2024-05-06T13:54:27", "db": "PACKETSTORM", "id": "178454" }, { "date": "2021-10-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-1214" }, { "date": "2021-10-18T14:15:10.333000", "db": "NVD", "id": "CVE-2021-41991" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-12T00:00:00", "db": "VULHUB", "id": "VHN-403107" }, { "date": "2021-10-21T00:00:00", "db": "VULMON", "id": "CVE-2021-41991" }, { "date": "2022-02-15T00:53:00", "db": "JVNDB", "id": "JVNDB-2021-007493" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-1214" }, { "date": "2024-11-21T06:27:02.090000", "db": "NVD", "id": "CVE-2021-41991" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "164558" }, { "db": "PACKETSTORM", "id": "164554" }, { "db": "PACKETSTORM", "id": "178454" }, { "db": "CNNVD", "id": "CNNVD-202110-1214" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "strongSwan\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007493" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-1214" } ], "trust": 0.6 } }
opensuse-su-2021:3467-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for strongswan", "title": "Title of the patch" }, { "category": "description", "text": "This update for strongswan fixes the following issues:\n\nA feature was added:\n\n- Add auth_els plugin to support Marvell FC-SP encryption (jsc#SLE-20151)\n\nSecurity issues fixed:\n\n- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)\n- CVE-2021-41990: Fixed an integer Overflow in the gmp Plugin. (bsc#1191367)\n\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2021-3467", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3467-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:3467-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOTT66WWQ6OSMGWC35UZKJSSHCUIWURT/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:3467-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOTT66WWQ6OSMGWC35UZKJSSHCUIWURT/" }, { "category": "self", "summary": "SUSE Bug 1191367", "url": "https://bugzilla.suse.com/1191367" }, { "category": "self", "summary": "SUSE Bug 1191435", "url": "https://bugzilla.suse.com/1191435" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41990 page", "url": "https://www.suse.com/security/cve/CVE-2021-41990/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41991 page", "url": "https://www.suse.com/security/cve/CVE-2021-41991/" } ], "title": "Security update for strongswan", "tracking": { "current_release_date": "2021-10-19T11:16:45Z", "generator": { "date": "2021-10-19T11:16:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:3467-1", "initial_release_date": "2021-10-19T11:16:45Z", "revision_history": [ { "date": "2021-10-19T11:16:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-5.8.2-11.21.1.aarch64", "product_id": "strongswan-5.8.2-11.21.1.aarch64" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-hmac-5.8.2-11.21.1.aarch64", "product_id": "strongswan-hmac-5.8.2-11.21.1.aarch64" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-ipsec-5.8.2-11.21.1.aarch64", "product_id": "strongswan-ipsec-5.8.2-11.21.1.aarch64" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-libs0-5.8.2-11.21.1.aarch64", "product_id": "strongswan-libs0-5.8.2-11.21.1.aarch64" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-mysql-5.8.2-11.21.1.aarch64", "product_id": "strongswan-mysql-5.8.2-11.21.1.aarch64" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-nm-5.8.2-11.21.1.aarch64", "product_id": "strongswan-nm-5.8.2-11.21.1.aarch64" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-11.21.1.aarch64", "product": { "name": "strongswan-sqlite-5.8.2-11.21.1.aarch64", "product_id": "strongswan-sqlite-5.8.2-11.21.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "strongswan-doc-5.8.2-11.21.1.noarch", "product": { "name": "strongswan-doc-5.8.2-11.21.1.noarch", "product_id": "strongswan-doc-5.8.2-11.21.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-5.8.2-11.21.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-hmac-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-hmac-5.8.2-11.21.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-ipsec-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-ipsec-5.8.2-11.21.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-libs0-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-libs0-5.8.2-11.21.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-mysql-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-mysql-5.8.2-11.21.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-nm-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-nm-5.8.2-11.21.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-11.21.1.ppc64le", "product": { "name": "strongswan-sqlite-5.8.2-11.21.1.ppc64le", "product_id": "strongswan-sqlite-5.8.2-11.21.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-5.8.2-11.21.1.s390x", "product_id": "strongswan-5.8.2-11.21.1.s390x" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-hmac-5.8.2-11.21.1.s390x", "product_id": "strongswan-hmac-5.8.2-11.21.1.s390x" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-ipsec-5.8.2-11.21.1.s390x", "product_id": "strongswan-ipsec-5.8.2-11.21.1.s390x" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-libs0-5.8.2-11.21.1.s390x", "product_id": "strongswan-libs0-5.8.2-11.21.1.s390x" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-mysql-5.8.2-11.21.1.s390x", "product_id": "strongswan-mysql-5.8.2-11.21.1.s390x" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-nm-5.8.2-11.21.1.s390x", "product_id": "strongswan-nm-5.8.2-11.21.1.s390x" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-11.21.1.s390x", "product": { "name": "strongswan-sqlite-5.8.2-11.21.1.s390x", "product_id": "strongswan-sqlite-5.8.2-11.21.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-5.8.2-11.21.1.x86_64", "product_id": "strongswan-5.8.2-11.21.1.x86_64" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-hmac-5.8.2-11.21.1.x86_64", "product_id": "strongswan-hmac-5.8.2-11.21.1.x86_64" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-ipsec-5.8.2-11.21.1.x86_64", "product_id": "strongswan-ipsec-5.8.2-11.21.1.x86_64" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-libs0-5.8.2-11.21.1.x86_64", "product_id": "strongswan-libs0-5.8.2-11.21.1.x86_64" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-mysql-5.8.2-11.21.1.x86_64", "product_id": "strongswan-mysql-5.8.2-11.21.1.x86_64" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-nm-5.8.2-11.21.1.x86_64", "product_id": "strongswan-nm-5.8.2-11.21.1.x86_64" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-11.21.1.x86_64", "product": { "name": "strongswan-sqlite-5.8.2-11.21.1.x86_64", "product_id": "strongswan-sqlite-5.8.2-11.21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-5.8.2-11.21.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-11.21.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch" }, "product_reference": "strongswan-doc-5.8.2-11.21.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-hmac-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-hmac-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-hmac-5.8.2-11.21.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-ipsec-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-ipsec-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-ipsec-5.8.2-11.21.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-libs0-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-libs0-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-libs0-5.8.2-11.21.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-mysql-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-mysql-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-mysql-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-mysql-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-mysql-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-mysql-5.8.2-11.21.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-mysql-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-mysql-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-nm-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-sqlite-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64" }, "product_reference": "strongswan-sqlite-5.8.2-11.21.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-sqlite-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le" }, "product_reference": "strongswan-sqlite-5.8.2-11.21.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-sqlite-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x" }, "product_reference": "strongswan-sqlite-5.8.2-11.21.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-sqlite-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64" }, "product_reference": "strongswan-sqlite-5.8.2-11.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41990" } ], "notes": [ { "category": "general", "text": "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41990", "url": "https://www.suse.com/security/cve/CVE-2021-41990" }, { "category": "external", "summary": "SUSE Bug 1191367 for CVE-2021-41990", "url": "https://bugzilla.suse.com/1191367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-19T11:16:45Z", "details": "important" } ], "title": "CVE-2021-41990" }, { "cve": "CVE-2021-41991", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41991" } ], "notes": [ { "category": "general", "text": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41991", "url": "https://www.suse.com/security/cve/CVE-2021-41991" }, { "category": "external", "summary": "SUSE Bug 1191367 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191367" }, { "category": "external", "summary": "SUSE Bug 1191435 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191435" }, { "category": "external", "summary": "SUSE Bug 1192640 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1192640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-19T11:16:45Z", "details": "important" } ], "title": "CVE-2021-41991" } ] }
opensuse-su-2021:1399-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for strongswan", "title": "Title of the patch" }, { "category": "description", "text": "This update for strongswan fixes the following issues:\n\nA feature was added:\n\n- Add auth_els plugin to support Marvell FC-SP encryption (jsc#SLE-20151)\n\nSecurity issues fixed:\n\n- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)\n- CVE-2021-41990: Fixed an integer Overflow in the gmp Plugin. (bsc#1191367)\n\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-1399", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1399-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:1399-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EFL7BNFHRF7ZQZFGAWEPQ7ZQHD6T6CNA/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:1399-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EFL7BNFHRF7ZQZFGAWEPQ7ZQHD6T6CNA/" }, { "category": "self", "summary": "SUSE Bug 1191367", "url": "https://bugzilla.suse.com/1191367" }, { "category": "self", "summary": "SUSE Bug 1191435", "url": "https://bugzilla.suse.com/1191435" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41990 page", "url": "https://www.suse.com/security/cve/CVE-2021-41990/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41991 page", "url": "https://www.suse.com/security/cve/CVE-2021-41991/" } ], "title": "Security update for strongswan", "tracking": { "current_release_date": "2021-10-31T14:52:34Z", "generator": { "date": "2021-10-31T14:52:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:1399-1", "initial_release_date": "2021-10-31T14:52:34Z", "revision_history": [ { "date": "2021-10-31T14:52:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "strongswan-doc-5.8.2-lp152.2.18.1.noarch", "product": { "name": "strongswan-doc-5.8.2-lp152.2.18.1.noarch", "product_id": "strongswan-doc-5.8.2-lp152.2.18.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.8.2-lp152.2.18.1.x86_64", "product": { "name": "strongswan-5.8.2-lp152.2.18.1.x86_64", "product_id": "strongswan-5.8.2-lp152.2.18.1.x86_64" } }, { "category": "product_version", "name": "strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "product": { "name": "strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "product_id": "strongswan-hmac-5.8.2-lp152.2.18.1.x86_64" } }, { "category": "product_version", "name": "strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "product": { "name": "strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "product_id": "strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64" } }, { "category": "product_version", "name": "strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "product": { "name": "strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "product_id": "strongswan-libs0-5.8.2-lp152.2.18.1.x86_64" } }, { "category": "product_version", "name": "strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "product": { "name": "strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "product_id": "strongswan-mysql-5.8.2-lp152.2.18.1.x86_64" } }, { "category": "product_version", "name": "strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "product": { "name": "strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "product_id": "strongswan-nm-5.8.2-lp152.2.18.1.x86_64" } }, { "category": "product_version", "name": "strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", "product": { "name": "strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", "product_id": "strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64" }, "product_reference": "strongswan-5.8.2-lp152.2.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.8.2-lp152.2.18.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch" }, "product_reference": "strongswan-doc-5.8.2-lp152.2.18.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64" }, "product_reference": "strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64" }, "product_reference": "strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64" }, "product_reference": "strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-mysql-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64" }, "product_reference": "strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64" }, "product_reference": "strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64" }, "product_reference": "strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41990" } ], "notes": [ { "category": "general", "text": "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch", "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41990", "url": "https://www.suse.com/security/cve/CVE-2021-41990" }, { "category": "external", "summary": "SUSE Bug 1191367 for CVE-2021-41990", "url": "https://bugzilla.suse.com/1191367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch", "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch", "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-31T14:52:34Z", "details": "important" } ], "title": "CVE-2021-41990" }, { "cve": "CVE-2021-41991", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41991" } ], "notes": [ { "category": "general", "text": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch", "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41991", "url": "https://www.suse.com/security/cve/CVE-2021-41991" }, { "category": "external", "summary": "SUSE Bug 1191367 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191367" }, { "category": "external", "summary": "SUSE Bug 1191435 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191435" }, { "category": "external", "summary": "SUSE Bug 1192640 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1192640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch", "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch", "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-10-31T14:52:34Z", "details": "important" } ], "title": "CVE-2021-41991" } ] }
opensuse-su-2024:11655-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "strongswan-5.9.4-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the strongswan-5.9.4-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11655", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11655-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41990 page", "url": "https://www.suse.com/security/cve/CVE-2021-41990/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41991 page", "url": "https://www.suse.com/security/cve/CVE-2021-41991/" } ], "title": "strongswan-5.9.4-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11655-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "strongswan-5.9.4-1.1.aarch64", "product": { "name": "strongswan-5.9.4-1.1.aarch64", "product_id": "strongswan-5.9.4-1.1.aarch64" } }, { "category": "product_version", "name": "strongswan-doc-5.9.4-1.1.aarch64", "product": { "name": "strongswan-doc-5.9.4-1.1.aarch64", "product_id": "strongswan-doc-5.9.4-1.1.aarch64" } }, { "category": "product_version", "name": "strongswan-hmac-5.9.4-1.1.aarch64", "product": { "name": "strongswan-hmac-5.9.4-1.1.aarch64", "product_id": "strongswan-hmac-5.9.4-1.1.aarch64" } }, { "category": "product_version", "name": "strongswan-ipsec-5.9.4-1.1.aarch64", "product": { "name": "strongswan-ipsec-5.9.4-1.1.aarch64", "product_id": "strongswan-ipsec-5.9.4-1.1.aarch64" } }, { "category": "product_version", "name": "strongswan-libs0-5.9.4-1.1.aarch64", "product": { "name": "strongswan-libs0-5.9.4-1.1.aarch64", "product_id": "strongswan-libs0-5.9.4-1.1.aarch64" } }, { "category": "product_version", "name": "strongswan-mysql-5.9.4-1.1.aarch64", "product": { "name": "strongswan-mysql-5.9.4-1.1.aarch64", "product_id": "strongswan-mysql-5.9.4-1.1.aarch64" } }, { "category": "product_version", "name": "strongswan-nm-5.9.4-1.1.aarch64", "product": { "name": "strongswan-nm-5.9.4-1.1.aarch64", "product_id": "strongswan-nm-5.9.4-1.1.aarch64" } }, { "category": "product_version", "name": "strongswan-sqlite-5.9.4-1.1.aarch64", "product": { "name": "strongswan-sqlite-5.9.4-1.1.aarch64", "product_id": "strongswan-sqlite-5.9.4-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.9.4-1.1.ppc64le", "product": { "name": "strongswan-5.9.4-1.1.ppc64le", "product_id": "strongswan-5.9.4-1.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-doc-5.9.4-1.1.ppc64le", "product": { "name": "strongswan-doc-5.9.4-1.1.ppc64le", "product_id": "strongswan-doc-5.9.4-1.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-hmac-5.9.4-1.1.ppc64le", "product": { "name": "strongswan-hmac-5.9.4-1.1.ppc64le", "product_id": "strongswan-hmac-5.9.4-1.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-ipsec-5.9.4-1.1.ppc64le", "product": { "name": "strongswan-ipsec-5.9.4-1.1.ppc64le", "product_id": "strongswan-ipsec-5.9.4-1.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-libs0-5.9.4-1.1.ppc64le", "product": { "name": "strongswan-libs0-5.9.4-1.1.ppc64le", "product_id": "strongswan-libs0-5.9.4-1.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-mysql-5.9.4-1.1.ppc64le", "product": { "name": "strongswan-mysql-5.9.4-1.1.ppc64le", "product_id": "strongswan-mysql-5.9.4-1.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-nm-5.9.4-1.1.ppc64le", "product": { "name": "strongswan-nm-5.9.4-1.1.ppc64le", "product_id": "strongswan-nm-5.9.4-1.1.ppc64le" } }, { "category": "product_version", "name": "strongswan-sqlite-5.9.4-1.1.ppc64le", "product": { "name": "strongswan-sqlite-5.9.4-1.1.ppc64le", "product_id": "strongswan-sqlite-5.9.4-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.9.4-1.1.s390x", "product": { "name": "strongswan-5.9.4-1.1.s390x", "product_id": "strongswan-5.9.4-1.1.s390x" } }, { "category": "product_version", "name": "strongswan-doc-5.9.4-1.1.s390x", "product": { "name": "strongswan-doc-5.9.4-1.1.s390x", "product_id": "strongswan-doc-5.9.4-1.1.s390x" } }, { "category": "product_version", "name": "strongswan-hmac-5.9.4-1.1.s390x", "product": { "name": "strongswan-hmac-5.9.4-1.1.s390x", "product_id": "strongswan-hmac-5.9.4-1.1.s390x" } }, { "category": "product_version", "name": "strongswan-ipsec-5.9.4-1.1.s390x", "product": { "name": "strongswan-ipsec-5.9.4-1.1.s390x", "product_id": "strongswan-ipsec-5.9.4-1.1.s390x" } }, { "category": "product_version", "name": "strongswan-libs0-5.9.4-1.1.s390x", "product": { "name": "strongswan-libs0-5.9.4-1.1.s390x", "product_id": "strongswan-libs0-5.9.4-1.1.s390x" } }, { "category": "product_version", "name": "strongswan-mysql-5.9.4-1.1.s390x", "product": { "name": "strongswan-mysql-5.9.4-1.1.s390x", "product_id": "strongswan-mysql-5.9.4-1.1.s390x" } }, { "category": "product_version", "name": "strongswan-nm-5.9.4-1.1.s390x", "product": { "name": "strongswan-nm-5.9.4-1.1.s390x", "product_id": "strongswan-nm-5.9.4-1.1.s390x" } }, { "category": "product_version", "name": "strongswan-sqlite-5.9.4-1.1.s390x", "product": { "name": "strongswan-sqlite-5.9.4-1.1.s390x", "product_id": "strongswan-sqlite-5.9.4-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "strongswan-5.9.4-1.1.x86_64", "product": { "name": "strongswan-5.9.4-1.1.x86_64", "product_id": "strongswan-5.9.4-1.1.x86_64" } }, { "category": "product_version", "name": "strongswan-doc-5.9.4-1.1.x86_64", "product": { "name": "strongswan-doc-5.9.4-1.1.x86_64", "product_id": "strongswan-doc-5.9.4-1.1.x86_64" } }, { "category": "product_version", "name": "strongswan-hmac-5.9.4-1.1.x86_64", "product": { "name": "strongswan-hmac-5.9.4-1.1.x86_64", "product_id": "strongswan-hmac-5.9.4-1.1.x86_64" } }, { "category": "product_version", "name": "strongswan-ipsec-5.9.4-1.1.x86_64", "product": { "name": "strongswan-ipsec-5.9.4-1.1.x86_64", "product_id": "strongswan-ipsec-5.9.4-1.1.x86_64" } }, { "category": "product_version", "name": "strongswan-libs0-5.9.4-1.1.x86_64", "product": { "name": "strongswan-libs0-5.9.4-1.1.x86_64", "product_id": "strongswan-libs0-5.9.4-1.1.x86_64" } }, { "category": "product_version", "name": "strongswan-mysql-5.9.4-1.1.x86_64", "product": { "name": "strongswan-mysql-5.9.4-1.1.x86_64", "product_id": "strongswan-mysql-5.9.4-1.1.x86_64" } }, { "category": "product_version", "name": "strongswan-nm-5.9.4-1.1.x86_64", "product": { "name": "strongswan-nm-5.9.4-1.1.x86_64", "product_id": "strongswan-nm-5.9.4-1.1.x86_64" } }, { "category": "product_version", "name": "strongswan-sqlite-5.9.4-1.1.x86_64", "product": { "name": "strongswan-sqlite-5.9.4-1.1.x86_64", "product_id": "strongswan-sqlite-5.9.4-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64" }, "product_reference": "strongswan-5.9.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le" }, "product_reference": "strongswan-5.9.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x" }, "product_reference": "strongswan-5.9.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64" }, "product_reference": "strongswan-5.9.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64" }, "product_reference": "strongswan-doc-5.9.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le" }, "product_reference": "strongswan-doc-5.9.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x" }, "product_reference": "strongswan-doc-5.9.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-doc-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64" }, "product_reference": "strongswan-doc-5.9.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64" }, "product_reference": "strongswan-hmac-5.9.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le" }, "product_reference": "strongswan-hmac-5.9.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x" }, "product_reference": "strongswan-hmac-5.9.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-hmac-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64" }, "product_reference": "strongswan-hmac-5.9.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64" }, "product_reference": "strongswan-ipsec-5.9.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le" }, "product_reference": "strongswan-ipsec-5.9.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x" }, "product_reference": "strongswan-ipsec-5.9.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-ipsec-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64" }, "product_reference": "strongswan-ipsec-5.9.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64" }, "product_reference": "strongswan-libs0-5.9.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le" }, "product_reference": "strongswan-libs0-5.9.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x" }, "product_reference": "strongswan-libs0-5.9.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-libs0-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64" }, "product_reference": "strongswan-libs0-5.9.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-mysql-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64" }, "product_reference": "strongswan-mysql-5.9.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-mysql-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le" }, "product_reference": "strongswan-mysql-5.9.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-mysql-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x" }, "product_reference": "strongswan-mysql-5.9.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-mysql-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64" }, "product_reference": "strongswan-mysql-5.9.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64" }, "product_reference": "strongswan-nm-5.9.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le" }, "product_reference": "strongswan-nm-5.9.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x" }, "product_reference": "strongswan-nm-5.9.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-nm-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64" }, "product_reference": "strongswan-nm-5.9.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-sqlite-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64" }, "product_reference": "strongswan-sqlite-5.9.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-sqlite-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le" }, "product_reference": "strongswan-sqlite-5.9.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-sqlite-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x" }, "product_reference": "strongswan-sqlite-5.9.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "strongswan-sqlite-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64" }, "product_reference": "strongswan-sqlite-5.9.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41990" } ], "notes": [ { "category": "general", "text": "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41990", "url": "https://www.suse.com/security/cve/CVE-2021-41990" }, { "category": "external", "summary": "SUSE Bug 1191367 for CVE-2021-41990", "url": "https://bugzilla.suse.com/1191367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-41990" }, { "cve": "CVE-2021-41991", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41991" } ], "notes": [ { "category": "general", "text": "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41991", "url": "https://www.suse.com/security/cve/CVE-2021-41991" }, { "category": "external", "summary": "SUSE Bug 1191367 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191367" }, { "category": "external", "summary": "SUSE Bug 1191435 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1191435" }, { "category": "external", "summary": "SUSE Bug 1192640 for CVE-2021-41991", "url": "https://bugzilla.suse.com/1192640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-41991" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.