Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-41991 (GCVE-0-2021-41991)
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T03:22:25.655Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html", }, { name: "DSA-4989", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2021/dsa-4989", }, { name: "[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html", }, { name: "FEDORA-2021-0b37146973", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/", }, { name: "FEDORA-2021-b3df83339e", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/", }, { name: "FEDORA-2021-95fab6a482", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-08T12:06:09", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html", }, { name: "DSA-4989", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2021/dsa-4989", }, { name: "[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html", }, { name: "FEDORA-2021-0b37146973", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/", }, { name: "FEDORA-2021-b3df83339e", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/", }, { name: "FEDORA-2021-95fab6a482", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-41991", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", refsource: "MISC", url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { name: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html", refsource: "CONFIRM", url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html", }, { name: "DSA-4989", refsource: "DEBIAN", url: "https://www.debian.org/security/2021/dsa-4989", }, { name: "[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html", }, { name: "FEDORA-2021-0b37146973", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/", }, { name: "FEDORA-2021-b3df83339e", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/", }, { name: "FEDORA-2021-95fab6a482", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-41991", datePublished: "2021-10-18T13:44:25", dateReserved: "2021-10-04T00:00:00", dateUpdated: "2024-08-04T03:22:25.655Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.2.10\", \"versionEndExcluding\": \"5.9.4\", \"matchCriteriaId\": \"AE9611E9-41E8-4C83-BB26-E52C35252022\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:sinema_remote_connect_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"276E81AE-85C3-4DBA-B4E6-0BFD85DE03F5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18A57CBB-1089-4829-AD1E-89C927611A36\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF3E5DDA-1BD4-4511-A2C8-4B5D40E6755E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"373B769D-0E60-4362-BAE1-90BA6E0B211C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA9BB25C-D5E3-43DE-8C73-06BDC43CA960\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"049460B8-6186-44F9-B41F-284A2EC0B3B4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"205482DA-548C-4757-91F0-1599438873BD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2009C1FA-96D5-413C-9161-0DB55F841088\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"350FD323-C876-4C7A-A2E7-4B0660C87F6C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_sc632-2c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FF3D204-F783-4ED8-B6DC-7BAE65AB5E89\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_sc632-2c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A79836B-5EC1-40AF-8A57-9657EF6758E5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16B3F1A4-6AA2-48C4-B2B3-7CCFED8E35B6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A60FC550-A518-46BF-9124-E21DD654981C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:cp_1543-1_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8E64DDA-3855-4CDB-A42C-EE23FEDA9074\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F703FF33-882F-4CB5-9CA0-8FAE670B2AEF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A46FF27-6B0D-4606-9D7B-45912556416F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1256EB4B-DD8A-4F99-AE69-F74E8F789C63\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01483C0C-8A8D-4059-B4F6-D280A71178B9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_cp_1543sp-1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"843A8686-5172-4782-BB97-B5D3C6FB27A3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_eu_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80303992-FA4F-4F53-8A52-BF2E2BFB99A6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"209C7B1E-10F6-4215-AF69-CC36192E0FCE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_cp_1243-7_lte\\\\/us_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1D78E94-D826-4300-BD3D-E544A1D67B0D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_cp_1243-7_lte\\\\/us:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00DDA679-D761-4986-A0A0-4C00178DF0B5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_cp_1542sp-1_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7F1C19F-FCF8-4BB5-BDAE-F7B188A85A1A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_cp_1542sp-1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C868560-8BAE-462D-AED0-3C52EA9B6DB8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_sc636-2c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50CB213E-50AC-418F-A4CF-AEE1E0D74E00\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_sc636-2c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCB9BD17-7F1F-42E9-831F-EB907F9BC214\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C33C9CC6-C03E-47CA-9B8F-96C05C5A4DEE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_cp_1542sp-1_irc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E362CEA5-F47B-4294-8F2D-A0A7AC6FF390\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_sc642-2c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBCABEAA-F652-4DB4-89F9-19C6C3B7FB11\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_sc642-2c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10C7D54A-27B4-4195-8131-DD5380472A75\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.3\", \"matchCriteriaId\": \"656082A8-8160-4A1A-967B-F7CC27A218D5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_sc646-2c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E54AF1E6-0E52-447C-8946-18716D30EBE2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_sc622-2c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC252750-1EFC-4AA3-9477-A49E3BBD61F7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_sc622-2c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50FEE5FA-B141-4E5F-8673-363089262530\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_rail_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"934FCA36-A4F2-4B90-93DE-48A3A355D865\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1_rail:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A294530-727C-4535-8B02-668DF74587D4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"425AB6D7-7325-4028-9065-D24C597BEB62\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9E746CF-4009-4A14-8916-A9E0276CAF8B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A48B4A9-F8D3-433F-A95B-B541C13FF2C4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D7AB0D5-FD3E-416A-975B-D212B3350433\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"336471A8-D4AF-4935-B170-DAB2267C61DC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25634AD2-2CC0-45AF-B5DE-39D30CBA91A4\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.\"}, {\"lang\": \"es\", \"value\": \"La cach\\u00e9 de certificados en memoria en strongSwan versiones anteriores a 5.9.4, presenta un desbordamiento de enteros remoto al recibir muchas peticiones con diferentes certificados para llenar la cach\\u00e9 y posteriormente desencadenar la sustituci\\u00f3n de las entradas de la cach\\u00e9. El c\\u00f3digo intenta seleccionar una entrada de cach\\u00e9 menos usada mediante un generador de n\\u00fameros aleatorios, pero esto no es realizado correctamente. Una ejecuci\\u00f3n de c\\u00f3digo remota podr\\u00eda ser una peque\\u00f1a posibilidad\"}]", id: "CVE-2021-41991", lastModified: "2024-11-21T06:27:02.090", metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2021-10-18T14:15:10.333", references: "[{\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/strongswan/strongswan/releases/tag/5.9.4\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.debian.org/security/2021/dsa-4989\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/strongswan/strongswan/releases/tag/5.9.4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.debian.org/security/2021/dsa-4989\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-190\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2021-41991\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-10-18T14:15:10.333\",\"lastModified\":\"2024-11-21T06:27:02.090\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.\"},{\"lang\":\"es\",\"value\":\"La caché de certificados en memoria en strongSwan versiones anteriores a 5.9.4, presenta un desbordamiento de enteros remoto al recibir muchas peticiones con diferentes certificados para llenar la caché y posteriormente desencadenar la sustitución de las entradas de la caché. El código intenta seleccionar una entrada de caché menos usada mediante un generador de números aleatorios, pero esto no es realizado correctamente. Una ejecución de código remota podría ser una pequeña posibilidad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2.10\",\"versionEndExcluding\":\"5.9.4\",\"matchCriteriaId\":\"AE9611E9-41E8-4C83-BB26-E52C35252022\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinema_remote_connect_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"276E81AE-85C3-4DBA-B4E6-0BFD85DE03F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18A57CBB-1089-4829-AD1E-89C927611A36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF3E5DDA-1BD4-4511-A2C8-4B5D40E6755E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"373B769D-0E60-4362-BAE1-90BA6E0B211C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA9BB25C-D5E3-43DE-8C73-06BDC43CA960\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"049460B8-6186-44F9-B41F-284A2EC0B3B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"205482DA-548C-4757-91F0-1599438873BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2009C1FA-96D5-413C-9161-0DB55F841088\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"350FD323-C876-4C7A-A2E7-4B0660C87F6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_sc632-2c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF3D204-F783-4ED8-B6DC-7BAE65AB5E89\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_sc632-2c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A79836B-5EC1-40AF-8A57-9657EF6758E5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16B3F1A4-6AA2-48C4-B2B3-7CCFED8E35B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A60FC550-A518-46BF-9124-E21DD654981C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:cp_1543-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8E64DDA-3855-4CDB-A42C-EE23FEDA9074\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F703FF33-882F-4CB5-9CA0-8FAE670B2AEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A46FF27-6B0D-4606-9D7B-45912556416F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1256EB4B-DD8A-4F99-AE69-F74E8F789C63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01483C0C-8A8D-4059-B4F6-D280A71178B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1543sp-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"843A8686-5172-4782-BB97-B5D3C6FB27A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_eu_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80303992-FA4F-4F53-8A52-BF2E2BFB99A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"209C7B1E-10F6-4215-AF69-CC36192E0FCE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1243-7_lte\\\\/us_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D78E94-D826-4300-BD3D-E544A1D67B0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1243-7_lte\\\\/us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00DDA679-D761-4986-A0A0-4C00178DF0B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1542sp-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7F1C19F-FCF8-4BB5-BDAE-F7B188A85A1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1542sp-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C868560-8BAE-462D-AED0-3C52EA9B6DB8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_sc636-2c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50CB213E-50AC-418F-A4CF-AEE1E0D74E00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_sc636-2c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB9BD17-7F1F-42E9-831F-EB907F9BC214\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C33C9CC6-C03E-47CA-9B8F-96C05C5A4DEE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1542sp-1_irc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E362CEA5-F47B-4294-8F2D-A0A7AC6FF390\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_sc642-2c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBCABEAA-F652-4DB4-89F9-19C6C3B7FB11\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_sc642-2c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10C7D54A-27B4-4195-8131-DD5380472A75\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.3\",\"matchCriteriaId\":\"656082A8-8160-4A1A-967B-F7CC27A218D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_sc646-2c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E54AF1E6-0E52-447C-8946-18716D30EBE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_sc622-2c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC252750-1EFC-4AA3-9477-A49E3BBD61F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_sc622-2c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50FEE5FA-B141-4E5F-8673-363089262530\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_rail_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"934FCA36-A4F2-4B90-93DE-48A3A355D865\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1_rail:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A294530-727C-4535-8B02-668DF74587D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"425AB6D7-7325-4028-9065-D24C597BEB62\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9E746CF-4009-4A14-8916-A9E0276CAF8B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A48B4A9-F8D3-433F-A95B-B541C13FF2C4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D7AB0D5-FD3E-416A-975B-D212B3350433\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"336471A8-D4AF-4935-B170-DAB2267C61DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25634AD2-2CC0-45AF-B5DE-39D30CBA91A4\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/strongswan/strongswan/releases/tag/5.9.4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.debian.org/security/2021/dsa-4989\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/strongswan/strongswan/releases/tag/5.9.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2021/dsa-4989\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
fkie_cve-2021-41991
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*", matchCriteriaId: "AE9611E9-41E8-4C83-BB26-E52C35252022", versionEndExcluding: "5.9.4", versionStartIncluding: "4.2.10", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", matchCriteriaId: "E460AA51-FCDA-46B9-AE97-E6676AA5E194", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:siemens:sinema_remote_connect_server:-:*:*:*:*:*:*:*", matchCriteriaId: "276E81AE-85C3-4DBA-B4E6-0BFD85DE03F5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "18A57CBB-1089-4829-AD1E-89C927611A36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail:-:*:*:*:*:*:*:*", matchCriteriaId: "FF3E5DDA-1BD4-4511-A2C8-4B5D40E6755E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "373B769D-0E60-4362-BAE1-90BA6E0B211C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*", matchCriteriaId: "CA9BB25C-D5E3-43DE-8C73-06BDC43CA960", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "049460B8-6186-44F9-B41F-284A2EC0B3B4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "205482DA-548C-4757-91F0-1599438873BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2009C1FA-96D5-413C-9161-0DB55F841088", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*", matchCriteriaId: "350FD323-C876-4C7A-A2E7-4B0660C87F6C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_sc632-2c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4FF3D204-F783-4ED8-B6DC-7BAE65AB5E89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_sc632-2c:-:*:*:*:*:*:*:*", matchCriteriaId: "8A79836B-5EC1-40AF-8A57-9657EF6758E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "16B3F1A4-6AA2-48C4-B2B3-7CCFED8E35B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec:-:*:*:*:*:*:*:*", matchCriteriaId: "A60FC550-A518-46BF-9124-E21DD654981C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:cp_1543-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A8E64DDA-3855-4CDB-A42C-EE23FEDA9074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*", matchCriteriaId: "F703FF33-882F-4CB5-9CA0-8FAE670B2AEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7A46FF27-6B0D-4606-9D7B-45912556416F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*", matchCriteriaId: "1256EB4B-DD8A-4F99-AE69-F74E8F789C63", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01483C0C-8A8D-4059-B4F6-D280A71178B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_cp_1543sp-1:-:*:*:*:*:*:*:*", matchCriteriaId: "843A8686-5172-4782-BB97-B5D3C6FB27A3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_eu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "80303992-FA4F-4F53-8A52-BF2E2BFB99A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:*", matchCriteriaId: "209C7B1E-10F6-4215-AF69-CC36192E0FCE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_cp_1243-7_lte\\/us_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B1D78E94-D826-4300-BD3D-E544A1D67B0D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_cp_1243-7_lte\\/us:-:*:*:*:*:*:*:*", matchCriteriaId: "00DDA679-D761-4986-A0A0-4C00178DF0B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_cp_1542sp-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B7F1C19F-FCF8-4BB5-BDAE-F7B188A85A1A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_cp_1542sp-1:-:*:*:*:*:*:*:*", matchCriteriaId: "0C868560-8BAE-462D-AED0-3C52EA9B6DB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_sc636-2c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "50CB213E-50AC-418F-A4CF-AEE1E0D74E00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_sc636-2c:-:*:*:*:*:*:*:*", matchCriteriaId: "FCB9BD17-7F1F-42E9-831F-EB907F9BC214", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C33C9CC6-C03E-47CA-9B8F-96C05C5A4DEE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_cp_1542sp-1_irc:-:*:*:*:*:*:*:*", matchCriteriaId: "E362CEA5-F47B-4294-8F2D-A0A7AC6FF390", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_sc642-2c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EBCABEAA-F652-4DB4-89F9-19C6C3B7FB11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_sc642-2c:-:*:*:*:*:*:*:*", matchCriteriaId: "10C7D54A-27B4-4195-8131-DD5380472A75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "656082A8-8160-4A1A-967B-F7CC27A218D5", versionEndExcluding: "2.3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_sc646-2c:-:*:*:*:*:*:*:*", matchCriteriaId: "E54AF1E6-0E52-447C-8946-18716D30EBE2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_sc622-2c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC252750-1EFC-4AA3-9477-A49E3BBD61F7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_sc622-2c:-:*:*:*:*:*:*:*", matchCriteriaId: "50FEE5FA-B141-4E5F-8673-363089262530", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_rail_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "934FCA36-A4F2-4B90-93DE-48A3A355D865", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1_rail:-:*:*:*:*:*:*:*", matchCriteriaId: "4A294530-727C-4535-8B02-668DF74587D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "425AB6D7-7325-4028-9065-D24C597BEB62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1:-:*:*:*:*:*:*:*", matchCriteriaId: "F9E746CF-4009-4A14-8916-A9E0276CAF8B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0A48B4A9-F8D3-433F-A95B-B541C13FF2C4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*", matchCriteriaId: "5D7AB0D5-FD3E-416A-975B-D212B3350433", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "336471A8-D4AF-4935-B170-DAB2267C61DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail:-:*:*:*:*:*:*:*", matchCriteriaId: "25634AD2-2CC0-45AF-B5DE-39D30CBA91A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", }, { lang: "es", value: "La caché de certificados en memoria en strongSwan versiones anteriores a 5.9.4, presenta un desbordamiento de enteros remoto al recibir muchas peticiones con diferentes certificados para llenar la caché y posteriormente desencadenar la sustitución de las entradas de la caché. El código intenta seleccionar una entrada de caché menos usada mediante un generador de números aleatorios, pero esto no es realizado correctamente. Una ejecución de código remota podría ser una pequeña posibilidad", }, ], id: "CVE-2021-41991", lastModified: "2024-11-21T06:27:02.090", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-10-18T14:15:10.333", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4989", }, { source: "cve@mitre.org", url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4989", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-190", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
suse-su-2021:3469-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for strongswan", title: "Title of the patch", }, { category: "description", text: "This update for strongswan fixes the following issues:\n\n- Fix trailing quotation mark missing from example in README. (bsc#1167880)\n- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)\n- CVE-2021-41990: Fixed an integer Overflow in the gmp Plugin. (bsc#1191367)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-3469,SUSE-SLE-Product-HPC-15-2021-3469,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3469,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3469,SUSE-SLE-Product-SLES-15-2021-3469,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3469,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3469,SUSE-SLE-Product-SLES_SAP-15-2021-3469,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3469,SUSE-Storage-6-2021-3469", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3469-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:3469-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20213469-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:3469-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009614.html", }, { category: "self", summary: "SUSE Bug 1167880", url: "https://bugzilla.suse.com/1167880", }, { category: "self", summary: "SUSE Bug 1191367", url: "https://bugzilla.suse.com/1191367", }, { category: "self", summary: "SUSE Bug 1191435", url: "https://bugzilla.suse.com/1191435", }, { category: "self", summary: "SUSE CVE CVE-2021-41990 page", url: "https://www.suse.com/security/cve/CVE-2021-41990/", }, { category: "self", summary: "SUSE CVE CVE-2021-41991 page", url: "https://www.suse.com/security/cve/CVE-2021-41991/", }, ], title: "Security update for strongswan", tracking: { current_release_date: "2021-10-19T13:45:21Z", generator: { date: "2021-10-19T13:45:21Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:3469-1", initial_release_date: "2021-10-19T13:45:21Z", revision_history: [ { date: "2021-10-19T13:45:21Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "strongswan-5.8.2-4.14.2.aarch64", product: { name: "strongswan-5.8.2-4.14.2.aarch64", product_id: "strongswan-5.8.2-4.14.2.aarch64", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-4.14.2.aarch64", product: { name: "strongswan-hmac-5.8.2-4.14.2.aarch64", product_id: "strongswan-hmac-5.8.2-4.14.2.aarch64", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-4.14.2.aarch64", product: { name: "strongswan-ipsec-5.8.2-4.14.2.aarch64", product_id: "strongswan-ipsec-5.8.2-4.14.2.aarch64", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-4.14.2.aarch64", product: { name: "strongswan-libs0-5.8.2-4.14.2.aarch64", product_id: "strongswan-libs0-5.8.2-4.14.2.aarch64", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-4.14.2.aarch64", product: { name: "strongswan-mysql-5.8.2-4.14.2.aarch64", product_id: "strongswan-mysql-5.8.2-4.14.2.aarch64", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-4.14.2.aarch64", product: { name: "strongswan-nm-5.8.2-4.14.2.aarch64", product_id: "strongswan-nm-5.8.2-4.14.2.aarch64", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-4.14.2.aarch64", product: { name: "strongswan-sqlite-5.8.2-4.14.2.aarch64", product_id: "strongswan-sqlite-5.8.2-4.14.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "strongswan-5.8.2-4.14.2.i586", product: { name: "strongswan-5.8.2-4.14.2.i586", product_id: "strongswan-5.8.2-4.14.2.i586", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-4.14.2.i586", product: { name: "strongswan-hmac-5.8.2-4.14.2.i586", product_id: "strongswan-hmac-5.8.2-4.14.2.i586", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-4.14.2.i586", product: { name: "strongswan-ipsec-5.8.2-4.14.2.i586", product_id: "strongswan-ipsec-5.8.2-4.14.2.i586", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-4.14.2.i586", product: { name: "strongswan-libs0-5.8.2-4.14.2.i586", product_id: "strongswan-libs0-5.8.2-4.14.2.i586", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-4.14.2.i586", product: { name: "strongswan-mysql-5.8.2-4.14.2.i586", product_id: "strongswan-mysql-5.8.2-4.14.2.i586", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-4.14.2.i586", product: { name: "strongswan-nm-5.8.2-4.14.2.i586", product_id: "strongswan-nm-5.8.2-4.14.2.i586", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-4.14.2.i586", product: { name: "strongswan-sqlite-5.8.2-4.14.2.i586", product_id: "strongswan-sqlite-5.8.2-4.14.2.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "strongswan-doc-5.8.2-4.14.2.noarch", product: { name: "strongswan-doc-5.8.2-4.14.2.noarch", product_id: "strongswan-doc-5.8.2-4.14.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "strongswan-5.8.2-4.14.2.ppc64le", product: { name: "strongswan-5.8.2-4.14.2.ppc64le", product_id: "strongswan-5.8.2-4.14.2.ppc64le", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-4.14.2.ppc64le", product: { name: "strongswan-hmac-5.8.2-4.14.2.ppc64le", product_id: "strongswan-hmac-5.8.2-4.14.2.ppc64le", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-4.14.2.ppc64le", product: { name: "strongswan-ipsec-5.8.2-4.14.2.ppc64le", product_id: "strongswan-ipsec-5.8.2-4.14.2.ppc64le", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-4.14.2.ppc64le", product: { name: "strongswan-libs0-5.8.2-4.14.2.ppc64le", product_id: "strongswan-libs0-5.8.2-4.14.2.ppc64le", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-4.14.2.ppc64le", product: { name: "strongswan-mysql-5.8.2-4.14.2.ppc64le", product_id: "strongswan-mysql-5.8.2-4.14.2.ppc64le", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-4.14.2.ppc64le", product: { name: "strongswan-nm-5.8.2-4.14.2.ppc64le", product_id: "strongswan-nm-5.8.2-4.14.2.ppc64le", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-4.14.2.ppc64le", product: { name: "strongswan-sqlite-5.8.2-4.14.2.ppc64le", product_id: "strongswan-sqlite-5.8.2-4.14.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "strongswan-5.8.2-4.14.2.s390x", product: { name: "strongswan-5.8.2-4.14.2.s390x", product_id: "strongswan-5.8.2-4.14.2.s390x", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-4.14.2.s390x", product: { name: "strongswan-hmac-5.8.2-4.14.2.s390x", product_id: "strongswan-hmac-5.8.2-4.14.2.s390x", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-4.14.2.s390x", product: { name: "strongswan-ipsec-5.8.2-4.14.2.s390x", product_id: "strongswan-ipsec-5.8.2-4.14.2.s390x", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-4.14.2.s390x", product: { name: "strongswan-libs0-5.8.2-4.14.2.s390x", product_id: "strongswan-libs0-5.8.2-4.14.2.s390x", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-4.14.2.s390x", product: { name: "strongswan-mysql-5.8.2-4.14.2.s390x", product_id: "strongswan-mysql-5.8.2-4.14.2.s390x", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-4.14.2.s390x", product: { name: "strongswan-nm-5.8.2-4.14.2.s390x", product_id: "strongswan-nm-5.8.2-4.14.2.s390x", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-4.14.2.s390x", product: { name: "strongswan-sqlite-5.8.2-4.14.2.s390x", product_id: "strongswan-sqlite-5.8.2-4.14.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "strongswan-5.8.2-4.14.2.x86_64", product: { name: "strongswan-5.8.2-4.14.2.x86_64", product_id: "strongswan-5.8.2-4.14.2.x86_64", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-4.14.2.x86_64", product: { name: "strongswan-hmac-5.8.2-4.14.2.x86_64", product_id: "strongswan-hmac-5.8.2-4.14.2.x86_64", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-4.14.2.x86_64", product: { name: "strongswan-ipsec-5.8.2-4.14.2.x86_64", product_id: "strongswan-ipsec-5.8.2-4.14.2.x86_64", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-4.14.2.x86_64", product: { name: "strongswan-libs0-5.8.2-4.14.2.x86_64", product_id: "strongswan-libs0-5.8.2-4.14.2.x86_64", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-4.14.2.x86_64", product: { name: "strongswan-mysql-5.8.2-4.14.2.x86_64", product_id: "strongswan-mysql-5.8.2-4.14.2.x86_64", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-4.14.2.x86_64", product: { name: "strongswan-nm-5.8.2-4.14.2.x86_64", product_id: "strongswan-nm-5.8.2-4.14.2.x86_64", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-4.14.2.x86_64", product: { name: "strongswan-sqlite-5.8.2-4.14.2.x86_64", product_id: "strongswan-sqlite-5.8.2-4.14.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", }, product_reference: "strongswan-doc-5.8.2-4.14.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", }, product_reference: "strongswan-doc-5.8.2-4.14.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", }, product_reference: "strongswan-doc-5.8.2-4.14.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", }, product_reference: "strongswan-doc-5.8.2-4.14.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x", }, product_reference: "strongswan-5.8.2-4.14.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", }, product_reference: "strongswan-doc-5.8.2-4.14.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch", }, product_reference: "strongswan-doc-5.8.2-4.14.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x", }, product_reference: "strongswan-5.8.2-4.14.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", }, product_reference: "strongswan-doc-5.8.2-4.14.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch", }, product_reference: "strongswan-doc-5.8.2-4.14.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch", }, product_reference: "strongswan-doc-5.8.2-4.14.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-4.14.2.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-4.14.2.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch", }, product_reference: "strongswan-doc-5.8.2-4.14.2.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-4.14.2.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-hmac-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-4.14.2.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-4.14.2.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64", }, product_reference: "strongswan-libs0-5.8.2-4.14.2.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, ], }, vulnerabilities: [ { cve: "CVE-2021-41990", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41990", }, ], notes: [ { category: "general", text: "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-41990", url: "https://www.suse.com/security/cve/CVE-2021-41990", }, { category: "external", summary: "SUSE Bug 1191367 for CVE-2021-41990", url: "https://bugzilla.suse.com/1191367", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-19T13:45:21Z", details: "important", }, ], title: "CVE-2021-41990", }, { cve: "CVE-2021-41991", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41991", }, ], notes: [ { category: "general", text: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-41991", url: "https://www.suse.com/security/cve/CVE-2021-41991", }, { category: "external", summary: "SUSE Bug 1191367 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191367", }, { category: "external", summary: "SUSE Bug 1191435 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191435", }, { category: "external", summary: "SUSE Bug 1192640 for CVE-2021-41991", url: "https://bugzilla.suse.com/1192640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Enterprise Storage 6:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:strongswan-libs0-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-doc-5.8.2-4.14.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-hmac-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-ipsec-5.8.2-4.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:strongswan-libs0-5.8.2-4.14.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-19T13:45:21Z", details: "important", }, ], title: "CVE-2021-41991", }, ], }
suse-su-2021:3468-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for strongswan", title: "Title of the patch", }, { category: "description", text: "This update for strongswan fixes the following issues:\n\n- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)\n", title: "Description of the patch", }, { category: "details", text: "HPE-Helion-OpenStack-8-2021-3468,SUSE-2021-3468,SUSE-OpenStack-Cloud-8-2021-3468,SUSE-OpenStack-Cloud-9-2021-3468,SUSE-OpenStack-Cloud-Crowbar-8-2021-3468,SUSE-OpenStack-Cloud-Crowbar-9-2021-3468,SUSE-SLE-SAP-12-SP3-2021-3468,SUSE-SLE-SAP-12-SP4-2021-3468,SUSE-SLE-SERVER-12-SP2-BCL-2021-3468,SUSE-SLE-SERVER-12-SP3-2021-3468,SUSE-SLE-SERVER-12-SP3-BCL-2021-3468,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3468,SUSE-SLE-SERVER-12-SP5-2021-3468", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3468-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:3468-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20213468-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:3468-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009611.html", }, { category: "self", summary: "SUSE Bug 1191435", url: "https://bugzilla.suse.com/1191435", }, { category: "self", summary: "SUSE CVE CVE-2021-41991 page", url: "https://www.suse.com/security/cve/CVE-2021-41991/", }, ], title: "Security update for strongswan", tracking: { current_release_date: "2021-10-19T11:16:54Z", generator: { date: "2021-10-19T11:16:54Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:3468-1", initial_release_date: "2021-10-19T11:16:54Z", revision_history: [ { date: "2021-10-19T11:16:54Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "strongswan-5.1.3-26.16.1.aarch64", product: { name: "strongswan-5.1.3-26.16.1.aarch64", product_id: "strongswan-5.1.3-26.16.1.aarch64", }, }, { category: "product_version", name: "strongswan-cavs-5.1.3-26.16.1.aarch64", product: { name: "strongswan-cavs-5.1.3-26.16.1.aarch64", product_id: "strongswan-cavs-5.1.3-26.16.1.aarch64", }, }, { category: "product_version", name: "strongswan-hmac-5.1.3-26.16.1.aarch64", product: { name: "strongswan-hmac-5.1.3-26.16.1.aarch64", product_id: "strongswan-hmac-5.1.3-26.16.1.aarch64", }, }, { category: "product_version", name: "strongswan-ipsec-5.1.3-26.16.1.aarch64", product: { name: "strongswan-ipsec-5.1.3-26.16.1.aarch64", product_id: "strongswan-ipsec-5.1.3-26.16.1.aarch64", }, }, { category: "product_version", name: "strongswan-libs0-5.1.3-26.16.1.aarch64", product: { name: "strongswan-libs0-5.1.3-26.16.1.aarch64", product_id: "strongswan-libs0-5.1.3-26.16.1.aarch64", }, }, { category: "product_version", name: "strongswan-mysql-5.1.3-26.16.1.aarch64", product: { name: "strongswan-mysql-5.1.3-26.16.1.aarch64", product_id: "strongswan-mysql-5.1.3-26.16.1.aarch64", }, }, { category: "product_version", name: "strongswan-nm-5.1.3-26.16.1.aarch64", product: { name: "strongswan-nm-5.1.3-26.16.1.aarch64", product_id: "strongswan-nm-5.1.3-26.16.1.aarch64", }, }, { category: "product_version", name: "strongswan-sqlite-5.1.3-26.16.1.aarch64", product: { name: "strongswan-sqlite-5.1.3-26.16.1.aarch64", product_id: "strongswan-sqlite-5.1.3-26.16.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "strongswan-5.1.3-26.16.1.i586", product: { name: "strongswan-5.1.3-26.16.1.i586", product_id: "strongswan-5.1.3-26.16.1.i586", }, }, { category: "product_version", name: "strongswan-cavs-5.1.3-26.16.1.i586", product: { name: "strongswan-cavs-5.1.3-26.16.1.i586", product_id: "strongswan-cavs-5.1.3-26.16.1.i586", }, }, { category: "product_version", name: "strongswan-hmac-5.1.3-26.16.1.i586", product: { name: "strongswan-hmac-5.1.3-26.16.1.i586", product_id: "strongswan-hmac-5.1.3-26.16.1.i586", }, }, { category: "product_version", name: "strongswan-ipsec-5.1.3-26.16.1.i586", product: { name: "strongswan-ipsec-5.1.3-26.16.1.i586", product_id: "strongswan-ipsec-5.1.3-26.16.1.i586", }, }, { category: "product_version", name: "strongswan-libs0-5.1.3-26.16.1.i586", product: { name: "strongswan-libs0-5.1.3-26.16.1.i586", product_id: "strongswan-libs0-5.1.3-26.16.1.i586", }, }, { category: "product_version", name: "strongswan-mysql-5.1.3-26.16.1.i586", product: { name: "strongswan-mysql-5.1.3-26.16.1.i586", product_id: "strongswan-mysql-5.1.3-26.16.1.i586", }, }, { category: "product_version", name: "strongswan-nm-5.1.3-26.16.1.i586", product: { name: "strongswan-nm-5.1.3-26.16.1.i586", product_id: "strongswan-nm-5.1.3-26.16.1.i586", }, }, { category: "product_version", name: "strongswan-sqlite-5.1.3-26.16.1.i586", product: { name: "strongswan-sqlite-5.1.3-26.16.1.i586", product_id: "strongswan-sqlite-5.1.3-26.16.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "strongswan-doc-5.1.3-26.16.1.noarch", product: { name: "strongswan-doc-5.1.3-26.16.1.noarch", product_id: "strongswan-doc-5.1.3-26.16.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "strongswan-5.1.3-26.16.1.ppc64le", product: { name: "strongswan-5.1.3-26.16.1.ppc64le", product_id: "strongswan-5.1.3-26.16.1.ppc64le", }, }, { category: "product_version", name: "strongswan-cavs-5.1.3-26.16.1.ppc64le", product: { name: "strongswan-cavs-5.1.3-26.16.1.ppc64le", product_id: "strongswan-cavs-5.1.3-26.16.1.ppc64le", }, }, { category: "product_version", name: "strongswan-hmac-5.1.3-26.16.1.ppc64le", product: { name: "strongswan-hmac-5.1.3-26.16.1.ppc64le", product_id: "strongswan-hmac-5.1.3-26.16.1.ppc64le", }, }, { category: "product_version", name: "strongswan-ipsec-5.1.3-26.16.1.ppc64le", product: { name: "strongswan-ipsec-5.1.3-26.16.1.ppc64le", product_id: "strongswan-ipsec-5.1.3-26.16.1.ppc64le", }, }, { category: "product_version", name: "strongswan-libs0-5.1.3-26.16.1.ppc64le", product: { name: "strongswan-libs0-5.1.3-26.16.1.ppc64le", product_id: "strongswan-libs0-5.1.3-26.16.1.ppc64le", }, }, { category: "product_version", name: "strongswan-mysql-5.1.3-26.16.1.ppc64le", product: { name: "strongswan-mysql-5.1.3-26.16.1.ppc64le", product_id: "strongswan-mysql-5.1.3-26.16.1.ppc64le", }, }, { category: "product_version", name: "strongswan-nm-5.1.3-26.16.1.ppc64le", product: { name: "strongswan-nm-5.1.3-26.16.1.ppc64le", product_id: "strongswan-nm-5.1.3-26.16.1.ppc64le", }, }, { category: "product_version", name: "strongswan-sqlite-5.1.3-26.16.1.ppc64le", product: { name: "strongswan-sqlite-5.1.3-26.16.1.ppc64le", product_id: "strongswan-sqlite-5.1.3-26.16.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "strongswan-5.1.3-26.16.1.s390", product: { name: "strongswan-5.1.3-26.16.1.s390", product_id: "strongswan-5.1.3-26.16.1.s390", }, }, { category: "product_version", name: "strongswan-cavs-5.1.3-26.16.1.s390", product: { name: "strongswan-cavs-5.1.3-26.16.1.s390", product_id: "strongswan-cavs-5.1.3-26.16.1.s390", }, }, { category: "product_version", name: "strongswan-hmac-5.1.3-26.16.1.s390", product: { name: "strongswan-hmac-5.1.3-26.16.1.s390", product_id: "strongswan-hmac-5.1.3-26.16.1.s390", }, }, { category: "product_version", name: "strongswan-ipsec-5.1.3-26.16.1.s390", product: { name: "strongswan-ipsec-5.1.3-26.16.1.s390", product_id: "strongswan-ipsec-5.1.3-26.16.1.s390", }, }, { category: "product_version", name: "strongswan-libs0-5.1.3-26.16.1.s390", product: { name: "strongswan-libs0-5.1.3-26.16.1.s390", product_id: "strongswan-libs0-5.1.3-26.16.1.s390", }, }, { category: "product_version", name: "strongswan-mysql-5.1.3-26.16.1.s390", product: { name: "strongswan-mysql-5.1.3-26.16.1.s390", product_id: "strongswan-mysql-5.1.3-26.16.1.s390", }, }, { category: "product_version", name: "strongswan-nm-5.1.3-26.16.1.s390", product: { name: "strongswan-nm-5.1.3-26.16.1.s390", product_id: "strongswan-nm-5.1.3-26.16.1.s390", }, }, { category: "product_version", name: "strongswan-sqlite-5.1.3-26.16.1.s390", product: { name: "strongswan-sqlite-5.1.3-26.16.1.s390", product_id: "strongswan-sqlite-5.1.3-26.16.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "strongswan-5.1.3-26.16.1.s390x", product: { name: "strongswan-5.1.3-26.16.1.s390x", product_id: "strongswan-5.1.3-26.16.1.s390x", }, }, { category: "product_version", name: "strongswan-cavs-5.1.3-26.16.1.s390x", product: { name: "strongswan-cavs-5.1.3-26.16.1.s390x", product_id: "strongswan-cavs-5.1.3-26.16.1.s390x", }, }, { category: "product_version", name: "strongswan-hmac-5.1.3-26.16.1.s390x", product: { name: "strongswan-hmac-5.1.3-26.16.1.s390x", product_id: "strongswan-hmac-5.1.3-26.16.1.s390x", }, }, { category: "product_version", name: "strongswan-ipsec-5.1.3-26.16.1.s390x", product: { name: "strongswan-ipsec-5.1.3-26.16.1.s390x", product_id: "strongswan-ipsec-5.1.3-26.16.1.s390x", }, }, { category: "product_version", name: "strongswan-libs0-5.1.3-26.16.1.s390x", product: { name: "strongswan-libs0-5.1.3-26.16.1.s390x", product_id: "strongswan-libs0-5.1.3-26.16.1.s390x", }, }, { category: "product_version", name: "strongswan-mysql-5.1.3-26.16.1.s390x", product: { name: "strongswan-mysql-5.1.3-26.16.1.s390x", product_id: "strongswan-mysql-5.1.3-26.16.1.s390x", }, }, { category: "product_version", name: "strongswan-nm-5.1.3-26.16.1.s390x", product: { name: "strongswan-nm-5.1.3-26.16.1.s390x", product_id: "strongswan-nm-5.1.3-26.16.1.s390x", }, }, { category: "product_version", name: "strongswan-sqlite-5.1.3-26.16.1.s390x", product: { name: "strongswan-sqlite-5.1.3-26.16.1.s390x", product_id: "strongswan-sqlite-5.1.3-26.16.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "strongswan-5.1.3-26.16.1.x86_64", product: { name: "strongswan-5.1.3-26.16.1.x86_64", product_id: "strongswan-5.1.3-26.16.1.x86_64", }, }, { category: "product_version", name: "strongswan-hmac-5.1.3-26.16.1.x86_64", product: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64", product_id: "strongswan-hmac-5.1.3-26.16.1.x86_64", }, }, { category: "product_version", name: "strongswan-ipsec-5.1.3-26.16.1.x86_64", product: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64", product_id: "strongswan-ipsec-5.1.3-26.16.1.x86_64", }, }, { category: "product_version", name: "strongswan-libs0-5.1.3-26.16.1.x86_64", product: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64", product_id: "strongswan-libs0-5.1.3-26.16.1.x86_64", }, }, { category: "product_version", name: "strongswan-cavs-5.1.3-26.16.1.x86_64", product: { name: "strongswan-cavs-5.1.3-26.16.1.x86_64", product_id: "strongswan-cavs-5.1.3-26.16.1.x86_64", }, }, { category: "product_version", name: "strongswan-mysql-5.1.3-26.16.1.x86_64", product: { name: "strongswan-mysql-5.1.3-26.16.1.x86_64", product_id: "strongswan-mysql-5.1.3-26.16.1.x86_64", }, }, { category: "product_version", name: "strongswan-nm-5.1.3-26.16.1.x86_64", product: { name: "strongswan-nm-5.1.3-26.16.1.x86_64", product_id: "strongswan-nm-5.1.3-26.16.1.x86_64", }, }, { category: "product_version", name: "strongswan-sqlite-5.1.3-26.16.1.x86_64", product: { name: "strongswan-sqlite-5.1.3-26.16.1.x86_64", product_id: "strongswan-sqlite-5.1.3-26.16.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "HPE Helion OpenStack 8", product: { name: "HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8", product_identification_helper: { cpe: "cpe:/o:suse:hpe-helion-openstack:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 8", product: { name: "SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 9", product: { name: "SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:9", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 8", product: { name: "SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 9", product: { name: "SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:9", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:strongswan-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-5.1.3-26.16.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.1.3-26.16.1.noarch as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:strongswan-doc-5.1.3-26.16.1.noarch", }, product_reference: "strongswan-doc-5.1.3-26.16.1.noarch", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:strongswan-hmac-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:strongswan-libs0-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:strongswan-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:strongswan-doc-5.1.3-26.16.1.noarch", }, product_reference: "strongswan-doc-5.1.3-26.16.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:strongswan-hmac-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:strongswan-libs0-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:strongswan-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:strongswan-doc-5.1.3-26.16.1.noarch", }, product_reference: "strongswan-doc-5.1.3-26.16.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:strongswan-hmac-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:strongswan-libs0-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:strongswan-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:strongswan-doc-5.1.3-26.16.1.noarch", }, product_reference: "strongswan-doc-5.1.3-26.16.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:strongswan-hmac-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:strongswan-libs0-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:strongswan-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:strongswan-doc-5.1.3-26.16.1.noarch", }, product_reference: "strongswan-doc-5.1.3-26.16.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:strongswan-hmac-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:strongswan-libs0-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-doc-5.1.3-26.16.1.noarch", }, product_reference: "strongswan-doc-5.1.3-26.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-doc-5.1.3-26.16.1.noarch", }, product_reference: "strongswan-doc-5.1.3-26.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-doc-5.1.3-26.16.1.noarch", }, product_reference: "strongswan-doc-5.1.3-26.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", }, product_reference: "strongswan-doc-5.1.3-26.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-doc-5.1.3-26.16.1.noarch", }, product_reference: "strongswan-doc-5.1.3-26.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", }, product_reference: "strongswan-doc-5.1.3-26.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", }, product_reference: "strongswan-doc-5.1.3-26.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.1.3-26.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", }, product_reference: "strongswan-doc-5.1.3-26.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-hmac-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-ipsec-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.1.3-26.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", }, product_reference: "strongswan-libs0-5.1.3-26.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2021-41991", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41991", }, ], notes: [ { category: "general", text: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:strongswan-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-doc-5.1.3-26.16.1.noarch", "HPE Helion OpenStack 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud 9:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud Crowbar 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud Crowbar 9:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-libs0-5.1.3-26.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-41991", url: "https://www.suse.com/security/cve/CVE-2021-41991", }, { category: "external", summary: "SUSE Bug 1191367 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191367", }, { category: "external", summary: "SUSE Bug 1191435 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191435", }, { category: "external", summary: "SUSE Bug 1192640 for CVE-2021-41991", url: "https://bugzilla.suse.com/1192640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:strongswan-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-doc-5.1.3-26.16.1.noarch", "HPE Helion OpenStack 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud 9:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud Crowbar 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud Crowbar 9:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-libs0-5.1.3-26.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:strongswan-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-doc-5.1.3-26.16.1.noarch", "HPE Helion OpenStack 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "HPE Helion OpenStack 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud 9:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud 9:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud Crowbar 8:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:strongswan-libs0-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-doc-5.1.3-26.16.1.noarch", "SUSE OpenStack Cloud Crowbar 9:strongswan-hmac-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-ipsec-5.1.3-26.16.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:strongswan-libs0-5.1.3-26.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-19T11:16:54Z", details: "important", }, ], title: "CVE-2021-41991", }, ], }
suse-su-2021:14827-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for strongswan", title: "Title of the patch", }, { category: "description", text: "This update for strongswan fixes the following issues:\n\n- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)\n", title: "Description of the patch", }, { category: "details", text: "sleposp3-strongswan-14827,slessp4-strongswan-14827", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_14827-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:14827-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-202114827-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:14827-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009612.html", }, { category: "self", summary: "SUSE Bug 1191435", url: "https://bugzilla.suse.com/1191435", }, { category: "self", summary: "SUSE CVE CVE-2021-41991 page", url: "https://www.suse.com/security/cve/CVE-2021-41991/", }, ], title: "Security update for strongswan", tracking: { current_release_date: "2021-10-19T11:16:08Z", generator: { date: "2021-10-19T11:16:08Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:14827-1", initial_release_date: "2021-10-19T11:16:08Z", revision_history: [ { date: "2021-10-19T11:16:08Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "strongswan-4.4.0-6.36.9.1.i586", product: { name: "strongswan-4.4.0-6.36.9.1.i586", product_id: "strongswan-4.4.0-6.36.9.1.i586", }, }, { category: "product_version", name: "strongswan-doc-4.4.0-6.36.9.1.i586", product: { name: "strongswan-doc-4.4.0-6.36.9.1.i586", product_id: "strongswan-doc-4.4.0-6.36.9.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "strongswan-4.4.0-6.36.9.1.ppc64", product: { name: "strongswan-4.4.0-6.36.9.1.ppc64", product_id: "strongswan-4.4.0-6.36.9.1.ppc64", }, }, { category: "product_version", name: "strongswan-doc-4.4.0-6.36.9.1.ppc64", product: { name: "strongswan-doc-4.4.0-6.36.9.1.ppc64", product_id: "strongswan-doc-4.4.0-6.36.9.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "strongswan-4.4.0-6.36.9.1.s390x", product: { name: "strongswan-4.4.0-6.36.9.1.s390x", product_id: "strongswan-4.4.0-6.36.9.1.s390x", }, }, { category: "product_version", name: "strongswan-doc-4.4.0-6.36.9.1.s390x", product: { name: "strongswan-doc-4.4.0-6.36.9.1.s390x", product_id: "strongswan-doc-4.4.0-6.36.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "strongswan-4.4.0-6.36.9.1.x86_64", product: { name: "strongswan-4.4.0-6.36.9.1.x86_64", product_id: "strongswan-4.4.0-6.36.9.1.x86_64", }, }, { category: "product_version", name: "strongswan-doc-4.4.0-6.36.9.1.x86_64", product: { name: "strongswan-doc-4.4.0-6.36.9.1.x86_64", product_id: "strongswan-doc-4.4.0-6.36.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Point of Sale 11 SP3", product: { name: "SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-pos:11:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "strongswan-4.4.0-6.36.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-4.4.0-6.36.9.1.i586", }, product_reference: "strongswan-4.4.0-6.36.9.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-4.4.0-6.36.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-doc-4.4.0-6.36.9.1.i586", }, product_reference: "strongswan-doc-4.4.0-6.36.9.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-4.4.0-6.36.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.i586", }, product_reference: "strongswan-4.4.0-6.36.9.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-4.4.0-6.36.9.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.ppc64", }, product_reference: "strongswan-4.4.0-6.36.9.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-4.4.0-6.36.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.s390x", }, product_reference: "strongswan-4.4.0-6.36.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-4.4.0-6.36.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.x86_64", }, product_reference: "strongswan-4.4.0-6.36.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-4.4.0-6.36.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.i586", }, product_reference: "strongswan-doc-4.4.0-6.36.9.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-4.4.0-6.36.9.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.ppc64", }, product_reference: "strongswan-doc-4.4.0-6.36.9.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-4.4.0-6.36.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.s390x", }, product_reference: "strongswan-doc-4.4.0-6.36.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-4.4.0-6.36.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.x86_64", }, product_reference: "strongswan-doc-4.4.0-6.36.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2021-41991", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41991", }, ], notes: [ { category: "general", text: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-doc-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-41991", url: "https://www.suse.com/security/cve/CVE-2021-41991", }, { category: "external", summary: "SUSE Bug 1191367 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191367", }, { category: "external", summary: "SUSE Bug 1191435 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191435", }, { category: "external", summary: "SUSE Bug 1192640 for CVE-2021-41991", url: "https://bugzilla.suse.com/1192640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-doc-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:strongswan-doc-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-4.4.0-6.36.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:strongswan-doc-4.4.0-6.36.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-19T11:16:08Z", details: "important", }, ], title: "CVE-2021-41991", }, ], }
suse-su-2021:3467-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for strongswan", title: "Title of the patch", }, { category: "description", text: "This update for strongswan fixes the following issues:\n\nA feature was added:\n\n- Add auth_els plugin to support Marvell FC-SP encryption (jsc#SLE-20151)\n\nSecurity issues fixed:\n\n- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)\n- CVE-2021-41990: Fixed an integer Overflow in the gmp Plugin. (bsc#1191367)\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-3467,SUSE-SLE-Module-Basesystem-15-SP2-2021-3467,SUSE-SLE-Module-Basesystem-15-SP3-2021-3467,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-3467,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3467,SUSE-SLE-Product-WE-15-SP2-2021-3467,SUSE-SLE-Product-WE-15-SP3-2021-3467", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3467-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:3467-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20213467-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:3467-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009613.html", }, { category: "self", summary: "SUSE Bug 1191367", url: "https://bugzilla.suse.com/1191367", }, { category: "self", summary: "SUSE Bug 1191435", url: "https://bugzilla.suse.com/1191435", }, { category: "self", summary: "SUSE CVE CVE-2021-41990 page", url: "https://www.suse.com/security/cve/CVE-2021-41990/", }, { category: "self", summary: "SUSE CVE CVE-2021-41991 page", url: "https://www.suse.com/security/cve/CVE-2021-41991/", }, ], title: "Security update for strongswan", tracking: { current_release_date: "2021-10-19T11:16:44Z", generator: { date: "2021-10-19T11:16:44Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:3467-1", initial_release_date: "2021-10-19T11:16:44Z", revision_history: [ { date: "2021-10-19T11:16:44Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "strongswan-5.8.2-11.21.1.aarch64", product: { name: "strongswan-5.8.2-11.21.1.aarch64", product_id: "strongswan-5.8.2-11.21.1.aarch64", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-11.21.1.aarch64", product: { name: "strongswan-hmac-5.8.2-11.21.1.aarch64", product_id: "strongswan-hmac-5.8.2-11.21.1.aarch64", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-11.21.1.aarch64", product: { name: "strongswan-ipsec-5.8.2-11.21.1.aarch64", product_id: "strongswan-ipsec-5.8.2-11.21.1.aarch64", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-11.21.1.aarch64", product: { name: "strongswan-libs0-5.8.2-11.21.1.aarch64", product_id: "strongswan-libs0-5.8.2-11.21.1.aarch64", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-11.21.1.aarch64", product: { name: "strongswan-mysql-5.8.2-11.21.1.aarch64", product_id: "strongswan-mysql-5.8.2-11.21.1.aarch64", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-11.21.1.aarch64", product: { name: "strongswan-nm-5.8.2-11.21.1.aarch64", product_id: "strongswan-nm-5.8.2-11.21.1.aarch64", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-11.21.1.aarch64", product: { name: "strongswan-sqlite-5.8.2-11.21.1.aarch64", product_id: "strongswan-sqlite-5.8.2-11.21.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "strongswan-5.8.2-11.21.1.i586", product: { name: "strongswan-5.8.2-11.21.1.i586", product_id: "strongswan-5.8.2-11.21.1.i586", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-11.21.1.i586", product: { name: "strongswan-hmac-5.8.2-11.21.1.i586", product_id: "strongswan-hmac-5.8.2-11.21.1.i586", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-11.21.1.i586", product: { name: "strongswan-ipsec-5.8.2-11.21.1.i586", product_id: "strongswan-ipsec-5.8.2-11.21.1.i586", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-11.21.1.i586", product: { name: "strongswan-libs0-5.8.2-11.21.1.i586", product_id: "strongswan-libs0-5.8.2-11.21.1.i586", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-11.21.1.i586", product: { name: "strongswan-mysql-5.8.2-11.21.1.i586", product_id: "strongswan-mysql-5.8.2-11.21.1.i586", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-11.21.1.i586", product: { name: "strongswan-nm-5.8.2-11.21.1.i586", product_id: "strongswan-nm-5.8.2-11.21.1.i586", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-11.21.1.i586", product: { name: "strongswan-sqlite-5.8.2-11.21.1.i586", product_id: "strongswan-sqlite-5.8.2-11.21.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "strongswan-doc-5.8.2-11.21.1.noarch", product: { name: "strongswan-doc-5.8.2-11.21.1.noarch", product_id: "strongswan-doc-5.8.2-11.21.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "strongswan-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-5.8.2-11.21.1.ppc64le", product_id: "strongswan-5.8.2-11.21.1.ppc64le", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-hmac-5.8.2-11.21.1.ppc64le", product_id: "strongswan-hmac-5.8.2-11.21.1.ppc64le", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-ipsec-5.8.2-11.21.1.ppc64le", product_id: "strongswan-ipsec-5.8.2-11.21.1.ppc64le", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-libs0-5.8.2-11.21.1.ppc64le", product_id: "strongswan-libs0-5.8.2-11.21.1.ppc64le", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-mysql-5.8.2-11.21.1.ppc64le", product_id: "strongswan-mysql-5.8.2-11.21.1.ppc64le", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-nm-5.8.2-11.21.1.ppc64le", product_id: "strongswan-nm-5.8.2-11.21.1.ppc64le", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-sqlite-5.8.2-11.21.1.ppc64le", product_id: "strongswan-sqlite-5.8.2-11.21.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "strongswan-5.8.2-11.21.1.s390x", product: { name: "strongswan-5.8.2-11.21.1.s390x", product_id: "strongswan-5.8.2-11.21.1.s390x", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-11.21.1.s390x", product: { name: "strongswan-hmac-5.8.2-11.21.1.s390x", product_id: "strongswan-hmac-5.8.2-11.21.1.s390x", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-11.21.1.s390x", product: { name: "strongswan-ipsec-5.8.2-11.21.1.s390x", product_id: "strongswan-ipsec-5.8.2-11.21.1.s390x", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-11.21.1.s390x", product: { name: "strongswan-libs0-5.8.2-11.21.1.s390x", product_id: "strongswan-libs0-5.8.2-11.21.1.s390x", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-11.21.1.s390x", product: { name: "strongswan-mysql-5.8.2-11.21.1.s390x", product_id: "strongswan-mysql-5.8.2-11.21.1.s390x", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-11.21.1.s390x", product: { name: "strongswan-nm-5.8.2-11.21.1.s390x", product_id: "strongswan-nm-5.8.2-11.21.1.s390x", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-11.21.1.s390x", product: { name: "strongswan-sqlite-5.8.2-11.21.1.s390x", product_id: "strongswan-sqlite-5.8.2-11.21.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "strongswan-5.8.2-11.21.1.x86_64", product: { name: "strongswan-5.8.2-11.21.1.x86_64", product_id: "strongswan-5.8.2-11.21.1.x86_64", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-11.21.1.x86_64", product: { name: "strongswan-hmac-5.8.2-11.21.1.x86_64", product_id: "strongswan-hmac-5.8.2-11.21.1.x86_64", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-11.21.1.x86_64", product: { name: "strongswan-ipsec-5.8.2-11.21.1.x86_64", product_id: "strongswan-ipsec-5.8.2-11.21.1.x86_64", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-11.21.1.x86_64", product: { name: "strongswan-libs0-5.8.2-11.21.1.x86_64", product_id: "strongswan-libs0-5.8.2-11.21.1.x86_64", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-11.21.1.x86_64", product: { name: "strongswan-mysql-5.8.2-11.21.1.x86_64", product_id: "strongswan-mysql-5.8.2-11.21.1.x86_64", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-11.21.1.x86_64", product: { name: "strongswan-nm-5.8.2-11.21.1.x86_64", product_id: "strongswan-nm-5.8.2-11.21.1.x86_64", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-11.21.1.x86_64", product: { name: "strongswan-sqlite-5.8.2-11.21.1.x86_64", product_id: "strongswan-sqlite-5.8.2-11.21.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Package Hub 15 SP2", product: { name: "SUSE Linux Enterprise Module for Package Hub 15 SP2", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Package Hub 15 SP3", product: { name: "SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP2", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP2", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP3", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-5.8.2-11.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-5.8.2-11.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-5.8.2-11.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-11.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch", }, product_reference: "strongswan-doc-5.8.2-11.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-hmac-5.8.2-11.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-hmac-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-hmac-5.8.2-11.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-hmac-5.8.2-11.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-ipsec-5.8.2-11.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-ipsec-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-ipsec-5.8.2-11.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-11.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-libs0-5.8.2-11.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-libs0-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-libs0-5.8.2-11.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-libs0-5.8.2-11.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-5.8.2-11.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-5.8.2-11.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-5.8.2-11.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-11.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch", }, product_reference: "strongswan-doc-5.8.2-11.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-hmac-5.8.2-11.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-hmac-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-hmac-5.8.2-11.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-hmac-5.8.2-11.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-ipsec-5.8.2-11.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-ipsec-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-ipsec-5.8.2-11.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-11.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-libs0-5.8.2-11.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-libs0-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-libs0-5.8.2-11.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-libs0-5.8.2-11.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP2", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-nm-5.8.2-11.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP2", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-nm-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP2", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-nm-5.8.2-11.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP2", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-nm-5.8.2-11.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-nm-5.8.2-11.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-nm-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-nm-5.8.2-11.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-nm-5.8.2-11.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP3", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-nm-5.8.2-11.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-nm-5.8.2-11.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-41990", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41990", }, ], notes: [ { category: "general", text: "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-41990", url: "https://www.suse.com/security/cve/CVE-2021-41990", }, { category: "external", summary: "SUSE Bug 1191367 for CVE-2021-41990", url: "https://bugzilla.suse.com/1191367", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-19T11:16:44Z", details: "important", }, ], title: "CVE-2021-41990", }, { cve: "CVE-2021-41991", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41991", }, ], notes: [ { category: "general", text: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-41991", url: "https://www.suse.com/security/cve/CVE-2021-41991", }, { category: "external", summary: "SUSE Bug 1191367 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191367", }, { category: "external", summary: "SUSE Bug 1191435 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191435", }, { category: "external", summary: "SUSE Bug 1192640 for CVE-2021-41991", url: "https://bugzilla.suse.com/1192640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-doc-5.8.2-11.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-hmac-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:strongswan-libs0-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:strongswan-nm-5.8.2-11.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:strongswan-nm-5.8.2-11.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-19T11:16:44Z", details: "important", }, ], title: "CVE-2021-41991", }, ], }
opensuse-su-2021:1399-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for strongswan", title: "Title of the patch", }, { category: "description", text: "This update for strongswan fixes the following issues:\n\nA feature was added:\n\n- Add auth_els plugin to support Marvell FC-SP encryption (jsc#SLE-20151)\n\nSecurity issues fixed:\n\n- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)\n- CVE-2021-41990: Fixed an integer Overflow in the gmp Plugin. (bsc#1191367)\n\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-1399", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1399-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:1399-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EFL7BNFHRF7ZQZFGAWEPQ7ZQHD6T6CNA/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:1399-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EFL7BNFHRF7ZQZFGAWEPQ7ZQHD6T6CNA/", }, { category: "self", summary: "SUSE Bug 1191367", url: "https://bugzilla.suse.com/1191367", }, { category: "self", summary: "SUSE Bug 1191435", url: "https://bugzilla.suse.com/1191435", }, { category: "self", summary: "SUSE CVE CVE-2021-41990 page", url: "https://www.suse.com/security/cve/CVE-2021-41990/", }, { category: "self", summary: "SUSE CVE CVE-2021-41991 page", url: "https://www.suse.com/security/cve/CVE-2021-41991/", }, ], title: "Security update for strongswan", tracking: { current_release_date: "2021-10-31T14:52:34Z", generator: { date: "2021-10-31T14:52:34Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:1399-1", initial_release_date: "2021-10-31T14:52:34Z", revision_history: [ { date: "2021-10-31T14:52:34Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "strongswan-doc-5.8.2-lp152.2.18.1.noarch", product: { name: "strongswan-doc-5.8.2-lp152.2.18.1.noarch", product_id: "strongswan-doc-5.8.2-lp152.2.18.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "strongswan-5.8.2-lp152.2.18.1.x86_64", product: { name: "strongswan-5.8.2-lp152.2.18.1.x86_64", product_id: "strongswan-5.8.2-lp152.2.18.1.x86_64", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", product: { name: "strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", product_id: "strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", product: { name: "strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", product_id: "strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", product: { name: "strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", product_id: "strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", product: { name: "strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", product_id: "strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-lp152.2.18.1.x86_64", product: { name: "strongswan-nm-5.8.2-lp152.2.18.1.x86_64", product_id: "strongswan-nm-5.8.2-lp152.2.18.1.x86_64", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", product: { name: "strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", product_id: "strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64", }, product_reference: "strongswan-5.8.2-lp152.2.18.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-lp152.2.18.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch", }, product_reference: "strongswan-doc-5.8.2-lp152.2.18.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", }, product_reference: "strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", }, product_reference: "strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "strongswan-mysql-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", }, product_reference: "strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64", }, product_reference: "strongswan-nm-5.8.2-lp152.2.18.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", }, product_reference: "strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2021-41990", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41990", }, ], notes: [ { category: "general", text: "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch", "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-41990", url: "https://www.suse.com/security/cve/CVE-2021-41990", }, { category: "external", summary: "SUSE Bug 1191367 for CVE-2021-41990", url: "https://bugzilla.suse.com/1191367", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch", "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch", "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-31T14:52:34Z", details: "important", }, ], title: "CVE-2021-41990", }, { cve: "CVE-2021-41991", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41991", }, ], notes: [ { category: "general", text: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch", "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-41991", url: "https://www.suse.com/security/cve/CVE-2021-41991", }, { category: "external", summary: "SUSE Bug 1191367 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191367", }, { category: "external", summary: "SUSE Bug 1191435 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191435", }, { category: "external", summary: "SUSE Bug 1192640 for CVE-2021-41991", url: "https://bugzilla.suse.com/1192640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch", "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:strongswan-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-doc-5.8.2-lp152.2.18.1.noarch", "openSUSE Leap 15.2:strongswan-hmac-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-ipsec-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-libs0-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-mysql-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-nm-5.8.2-lp152.2.18.1.x86_64", "openSUSE Leap 15.2:strongswan-sqlite-5.8.2-lp152.2.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-31T14:52:34Z", details: "important", }, ], title: "CVE-2021-41991", }, ], }
opensuse-su-2021:3467-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for strongswan", title: "Title of the patch", }, { category: "description", text: "This update for strongswan fixes the following issues:\n\nA feature was added:\n\n- Add auth_els plugin to support Marvell FC-SP encryption (jsc#SLE-20151)\n\nSecurity issues fixed:\n\n- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)\n- CVE-2021-41990: Fixed an integer Overflow in the gmp Plugin. (bsc#1191367)\n\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-SLE-15.3-2021-3467", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3467-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:3467-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOTT66WWQ6OSMGWC35UZKJSSHCUIWURT/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:3467-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOTT66WWQ6OSMGWC35UZKJSSHCUIWURT/", }, { category: "self", summary: "SUSE Bug 1191367", url: "https://bugzilla.suse.com/1191367", }, { category: "self", summary: "SUSE Bug 1191435", url: "https://bugzilla.suse.com/1191435", }, { category: "self", summary: "SUSE CVE CVE-2021-41990 page", url: "https://www.suse.com/security/cve/CVE-2021-41990/", }, { category: "self", summary: "SUSE CVE CVE-2021-41991 page", url: "https://www.suse.com/security/cve/CVE-2021-41991/", }, ], title: "Security update for strongswan", tracking: { current_release_date: "2021-10-19T11:16:45Z", generator: { date: "2021-10-19T11:16:45Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:3467-1", initial_release_date: "2021-10-19T11:16:45Z", revision_history: [ { date: "2021-10-19T11:16:45Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "strongswan-5.8.2-11.21.1.aarch64", product: { name: "strongswan-5.8.2-11.21.1.aarch64", product_id: "strongswan-5.8.2-11.21.1.aarch64", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-11.21.1.aarch64", product: { name: "strongswan-hmac-5.8.2-11.21.1.aarch64", product_id: "strongswan-hmac-5.8.2-11.21.1.aarch64", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-11.21.1.aarch64", product: { name: "strongswan-ipsec-5.8.2-11.21.1.aarch64", product_id: "strongswan-ipsec-5.8.2-11.21.1.aarch64", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-11.21.1.aarch64", product: { name: "strongswan-libs0-5.8.2-11.21.1.aarch64", product_id: "strongswan-libs0-5.8.2-11.21.1.aarch64", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-11.21.1.aarch64", product: { name: "strongswan-mysql-5.8.2-11.21.1.aarch64", product_id: "strongswan-mysql-5.8.2-11.21.1.aarch64", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-11.21.1.aarch64", product: { name: "strongswan-nm-5.8.2-11.21.1.aarch64", product_id: "strongswan-nm-5.8.2-11.21.1.aarch64", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-11.21.1.aarch64", product: { name: "strongswan-sqlite-5.8.2-11.21.1.aarch64", product_id: "strongswan-sqlite-5.8.2-11.21.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "strongswan-doc-5.8.2-11.21.1.noarch", product: { name: "strongswan-doc-5.8.2-11.21.1.noarch", product_id: "strongswan-doc-5.8.2-11.21.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "strongswan-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-5.8.2-11.21.1.ppc64le", product_id: "strongswan-5.8.2-11.21.1.ppc64le", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-hmac-5.8.2-11.21.1.ppc64le", product_id: "strongswan-hmac-5.8.2-11.21.1.ppc64le", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-ipsec-5.8.2-11.21.1.ppc64le", product_id: "strongswan-ipsec-5.8.2-11.21.1.ppc64le", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-libs0-5.8.2-11.21.1.ppc64le", product_id: "strongswan-libs0-5.8.2-11.21.1.ppc64le", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-mysql-5.8.2-11.21.1.ppc64le", product_id: "strongswan-mysql-5.8.2-11.21.1.ppc64le", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-nm-5.8.2-11.21.1.ppc64le", product_id: "strongswan-nm-5.8.2-11.21.1.ppc64le", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-11.21.1.ppc64le", product: { name: "strongswan-sqlite-5.8.2-11.21.1.ppc64le", product_id: "strongswan-sqlite-5.8.2-11.21.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "strongswan-5.8.2-11.21.1.s390x", product: { name: "strongswan-5.8.2-11.21.1.s390x", product_id: "strongswan-5.8.2-11.21.1.s390x", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-11.21.1.s390x", product: { name: "strongswan-hmac-5.8.2-11.21.1.s390x", product_id: "strongswan-hmac-5.8.2-11.21.1.s390x", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-11.21.1.s390x", product: { name: "strongswan-ipsec-5.8.2-11.21.1.s390x", product_id: "strongswan-ipsec-5.8.2-11.21.1.s390x", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-11.21.1.s390x", product: { name: "strongswan-libs0-5.8.2-11.21.1.s390x", product_id: "strongswan-libs0-5.8.2-11.21.1.s390x", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-11.21.1.s390x", product: { name: "strongswan-mysql-5.8.2-11.21.1.s390x", product_id: "strongswan-mysql-5.8.2-11.21.1.s390x", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-11.21.1.s390x", product: { name: "strongswan-nm-5.8.2-11.21.1.s390x", product_id: "strongswan-nm-5.8.2-11.21.1.s390x", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-11.21.1.s390x", product: { name: "strongswan-sqlite-5.8.2-11.21.1.s390x", product_id: "strongswan-sqlite-5.8.2-11.21.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "strongswan-5.8.2-11.21.1.x86_64", product: { name: "strongswan-5.8.2-11.21.1.x86_64", product_id: "strongswan-5.8.2-11.21.1.x86_64", }, }, { category: "product_version", name: "strongswan-hmac-5.8.2-11.21.1.x86_64", product: { name: "strongswan-hmac-5.8.2-11.21.1.x86_64", product_id: "strongswan-hmac-5.8.2-11.21.1.x86_64", }, }, { category: "product_version", name: "strongswan-ipsec-5.8.2-11.21.1.x86_64", product: { name: "strongswan-ipsec-5.8.2-11.21.1.x86_64", product_id: "strongswan-ipsec-5.8.2-11.21.1.x86_64", }, }, { category: "product_version", name: "strongswan-libs0-5.8.2-11.21.1.x86_64", product: { name: "strongswan-libs0-5.8.2-11.21.1.x86_64", product_id: "strongswan-libs0-5.8.2-11.21.1.x86_64", }, }, { category: "product_version", name: "strongswan-mysql-5.8.2-11.21.1.x86_64", product: { name: "strongswan-mysql-5.8.2-11.21.1.x86_64", product_id: "strongswan-mysql-5.8.2-11.21.1.x86_64", }, }, { category: "product_version", name: "strongswan-nm-5.8.2-11.21.1.x86_64", product: { name: "strongswan-nm-5.8.2-11.21.1.x86_64", product_id: "strongswan-nm-5.8.2-11.21.1.x86_64", }, }, { category: "product_version", name: "strongswan-sqlite-5.8.2-11.21.1.x86_64", product: { name: "strongswan-sqlite-5.8.2-11.21.1.x86_64", product_id: "strongswan-sqlite-5.8.2-11.21.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-5.8.2-11.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-5.8.2-11.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-5.8.2-11.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.8.2-11.21.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch", }, product_reference: "strongswan-doc-5.8.2-11.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-hmac-5.8.2-11.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-hmac-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-hmac-5.8.2-11.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-hmac-5.8.2-11.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-ipsec-5.8.2-11.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-ipsec-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-ipsec-5.8.2-11.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-ipsec-5.8.2-11.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-libs0-5.8.2-11.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-libs0-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-libs0-5.8.2-11.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-libs0-5.8.2-11.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-mysql-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-mysql-5.8.2-11.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-mysql-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-mysql-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-mysql-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-mysql-5.8.2-11.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-mysql-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-mysql-5.8.2-11.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-nm-5.8.2-11.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-nm-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-nm-5.8.2-11.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-nm-5.8.2-11.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-sqlite-5.8.2-11.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64", }, product_reference: "strongswan-sqlite-5.8.2-11.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-sqlite-5.8.2-11.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le", }, product_reference: "strongswan-sqlite-5.8.2-11.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-sqlite-5.8.2-11.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x", }, product_reference: "strongswan-sqlite-5.8.2-11.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "strongswan-sqlite-5.8.2-11.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64", }, product_reference: "strongswan-sqlite-5.8.2-11.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-41990", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41990", }, ], notes: [ { category: "general", text: "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-41990", url: "https://www.suse.com/security/cve/CVE-2021-41990", }, { category: "external", summary: "SUSE Bug 1191367 for CVE-2021-41990", url: "https://bugzilla.suse.com/1191367", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-19T11:16:45Z", details: "important", }, ], title: "CVE-2021-41990", }, { cve: "CVE-2021-41991", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41991", }, ], notes: [ { category: "general", text: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-41991", url: "https://www.suse.com/security/cve/CVE-2021-41991", }, { category: "external", summary: "SUSE Bug 1191367 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191367", }, { category: "external", summary: "SUSE Bug 1191435 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191435", }, { category: "external", summary: "SUSE Bug 1192640 for CVE-2021-41991", url: "https://bugzilla.suse.com/1192640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-doc-5.8.2-11.21.1.noarch", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-hmac-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-ipsec-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-libs0-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-mysql-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-nm-5.8.2-11.21.1.x86_64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.aarch64", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.ppc64le", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.s390x", "openSUSE Leap 15.3:strongswan-sqlite-5.8.2-11.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-19T11:16:45Z", details: "important", }, ], title: "CVE-2021-41991", }, ], }
opensuse-su-2024:11655-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "strongswan-5.9.4-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the strongswan-5.9.4-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11655", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11655-1.json", }, { category: "self", summary: "SUSE CVE CVE-2021-41990 page", url: "https://www.suse.com/security/cve/CVE-2021-41990/", }, { category: "self", summary: "SUSE CVE CVE-2021-41991 page", url: "https://www.suse.com/security/cve/CVE-2021-41991/", }, ], title: "strongswan-5.9.4-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11655-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "strongswan-5.9.4-1.1.aarch64", product: { name: "strongswan-5.9.4-1.1.aarch64", product_id: "strongswan-5.9.4-1.1.aarch64", }, }, { category: "product_version", name: "strongswan-doc-5.9.4-1.1.aarch64", product: { name: "strongswan-doc-5.9.4-1.1.aarch64", product_id: "strongswan-doc-5.9.4-1.1.aarch64", }, }, { category: "product_version", name: "strongswan-hmac-5.9.4-1.1.aarch64", product: { name: "strongswan-hmac-5.9.4-1.1.aarch64", product_id: "strongswan-hmac-5.9.4-1.1.aarch64", }, }, { category: "product_version", name: "strongswan-ipsec-5.9.4-1.1.aarch64", product: { name: "strongswan-ipsec-5.9.4-1.1.aarch64", product_id: "strongswan-ipsec-5.9.4-1.1.aarch64", }, }, { category: "product_version", name: "strongswan-libs0-5.9.4-1.1.aarch64", product: { name: "strongswan-libs0-5.9.4-1.1.aarch64", product_id: "strongswan-libs0-5.9.4-1.1.aarch64", }, }, { category: "product_version", name: "strongswan-mysql-5.9.4-1.1.aarch64", product: { name: "strongswan-mysql-5.9.4-1.1.aarch64", product_id: "strongswan-mysql-5.9.4-1.1.aarch64", }, }, { category: "product_version", name: "strongswan-nm-5.9.4-1.1.aarch64", product: { name: "strongswan-nm-5.9.4-1.1.aarch64", product_id: "strongswan-nm-5.9.4-1.1.aarch64", }, }, { category: "product_version", name: "strongswan-sqlite-5.9.4-1.1.aarch64", product: { name: "strongswan-sqlite-5.9.4-1.1.aarch64", product_id: "strongswan-sqlite-5.9.4-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "strongswan-5.9.4-1.1.ppc64le", product: { name: "strongswan-5.9.4-1.1.ppc64le", product_id: "strongswan-5.9.4-1.1.ppc64le", }, }, { category: "product_version", name: "strongswan-doc-5.9.4-1.1.ppc64le", product: { name: "strongswan-doc-5.9.4-1.1.ppc64le", product_id: "strongswan-doc-5.9.4-1.1.ppc64le", }, }, { category: "product_version", name: "strongswan-hmac-5.9.4-1.1.ppc64le", product: { name: "strongswan-hmac-5.9.4-1.1.ppc64le", product_id: "strongswan-hmac-5.9.4-1.1.ppc64le", }, }, { category: "product_version", name: "strongswan-ipsec-5.9.4-1.1.ppc64le", product: { name: "strongswan-ipsec-5.9.4-1.1.ppc64le", product_id: "strongswan-ipsec-5.9.4-1.1.ppc64le", }, }, { category: "product_version", name: "strongswan-libs0-5.9.4-1.1.ppc64le", product: { name: "strongswan-libs0-5.9.4-1.1.ppc64le", product_id: "strongswan-libs0-5.9.4-1.1.ppc64le", }, }, { category: "product_version", name: "strongswan-mysql-5.9.4-1.1.ppc64le", product: { name: "strongswan-mysql-5.9.4-1.1.ppc64le", product_id: "strongswan-mysql-5.9.4-1.1.ppc64le", }, }, { category: "product_version", name: "strongswan-nm-5.9.4-1.1.ppc64le", product: { name: "strongswan-nm-5.9.4-1.1.ppc64le", product_id: "strongswan-nm-5.9.4-1.1.ppc64le", }, }, { category: "product_version", name: "strongswan-sqlite-5.9.4-1.1.ppc64le", product: { name: "strongswan-sqlite-5.9.4-1.1.ppc64le", product_id: "strongswan-sqlite-5.9.4-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "strongswan-5.9.4-1.1.s390x", product: { name: "strongswan-5.9.4-1.1.s390x", product_id: "strongswan-5.9.4-1.1.s390x", }, }, { category: "product_version", name: "strongswan-doc-5.9.4-1.1.s390x", product: { name: "strongswan-doc-5.9.4-1.1.s390x", product_id: "strongswan-doc-5.9.4-1.1.s390x", }, }, { category: "product_version", name: "strongswan-hmac-5.9.4-1.1.s390x", product: { name: "strongswan-hmac-5.9.4-1.1.s390x", product_id: "strongswan-hmac-5.9.4-1.1.s390x", }, }, { category: "product_version", name: "strongswan-ipsec-5.9.4-1.1.s390x", product: { name: "strongswan-ipsec-5.9.4-1.1.s390x", product_id: "strongswan-ipsec-5.9.4-1.1.s390x", }, }, { category: "product_version", name: "strongswan-libs0-5.9.4-1.1.s390x", product: { name: "strongswan-libs0-5.9.4-1.1.s390x", product_id: "strongswan-libs0-5.9.4-1.1.s390x", }, }, { category: "product_version", name: "strongswan-mysql-5.9.4-1.1.s390x", product: { name: "strongswan-mysql-5.9.4-1.1.s390x", product_id: "strongswan-mysql-5.9.4-1.1.s390x", }, }, { category: "product_version", name: "strongswan-nm-5.9.4-1.1.s390x", product: { name: "strongswan-nm-5.9.4-1.1.s390x", product_id: "strongswan-nm-5.9.4-1.1.s390x", }, }, { category: "product_version", name: "strongswan-sqlite-5.9.4-1.1.s390x", product: { name: "strongswan-sqlite-5.9.4-1.1.s390x", product_id: "strongswan-sqlite-5.9.4-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "strongswan-5.9.4-1.1.x86_64", product: { name: "strongswan-5.9.4-1.1.x86_64", product_id: "strongswan-5.9.4-1.1.x86_64", }, }, { category: "product_version", name: "strongswan-doc-5.9.4-1.1.x86_64", product: { name: "strongswan-doc-5.9.4-1.1.x86_64", product_id: "strongswan-doc-5.9.4-1.1.x86_64", }, }, { category: "product_version", name: "strongswan-hmac-5.9.4-1.1.x86_64", product: { name: "strongswan-hmac-5.9.4-1.1.x86_64", product_id: "strongswan-hmac-5.9.4-1.1.x86_64", }, }, { category: "product_version", name: "strongswan-ipsec-5.9.4-1.1.x86_64", product: { name: "strongswan-ipsec-5.9.4-1.1.x86_64", product_id: "strongswan-ipsec-5.9.4-1.1.x86_64", }, }, { category: "product_version", name: "strongswan-libs0-5.9.4-1.1.x86_64", product: { name: "strongswan-libs0-5.9.4-1.1.x86_64", product_id: "strongswan-libs0-5.9.4-1.1.x86_64", }, }, { category: "product_version", name: "strongswan-mysql-5.9.4-1.1.x86_64", product: { name: "strongswan-mysql-5.9.4-1.1.x86_64", product_id: "strongswan-mysql-5.9.4-1.1.x86_64", }, }, { category: "product_version", name: "strongswan-nm-5.9.4-1.1.x86_64", product: { name: "strongswan-nm-5.9.4-1.1.x86_64", product_id: "strongswan-nm-5.9.4-1.1.x86_64", }, }, { category: "product_version", name: "strongswan-sqlite-5.9.4-1.1.x86_64", product: { name: "strongswan-sqlite-5.9.4-1.1.x86_64", product_id: "strongswan-sqlite-5.9.4-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "strongswan-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64", }, product_reference: "strongswan-5.9.4-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le", }, product_reference: "strongswan-5.9.4-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x", }, product_reference: "strongswan-5.9.4-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64", }, product_reference: "strongswan-5.9.4-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64", }, product_reference: "strongswan-doc-5.9.4-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le", }, product_reference: "strongswan-doc-5.9.4-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x", }, product_reference: "strongswan-doc-5.9.4-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-doc-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64", }, product_reference: "strongswan-doc-5.9.4-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64", }, product_reference: "strongswan-hmac-5.9.4-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le", }, product_reference: "strongswan-hmac-5.9.4-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x", }, product_reference: "strongswan-hmac-5.9.4-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-hmac-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64", }, product_reference: "strongswan-hmac-5.9.4-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64", }, product_reference: "strongswan-ipsec-5.9.4-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le", }, product_reference: "strongswan-ipsec-5.9.4-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x", }, product_reference: "strongswan-ipsec-5.9.4-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-ipsec-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64", }, product_reference: "strongswan-ipsec-5.9.4-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64", }, product_reference: "strongswan-libs0-5.9.4-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le", }, product_reference: "strongswan-libs0-5.9.4-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x", }, product_reference: "strongswan-libs0-5.9.4-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-libs0-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64", }, product_reference: "strongswan-libs0-5.9.4-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-mysql-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64", }, product_reference: "strongswan-mysql-5.9.4-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-mysql-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le", }, product_reference: "strongswan-mysql-5.9.4-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-mysql-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x", }, product_reference: "strongswan-mysql-5.9.4-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-mysql-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64", }, product_reference: "strongswan-mysql-5.9.4-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64", }, product_reference: "strongswan-nm-5.9.4-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le", }, product_reference: "strongswan-nm-5.9.4-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x", }, product_reference: "strongswan-nm-5.9.4-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-nm-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64", }, product_reference: "strongswan-nm-5.9.4-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-sqlite-5.9.4-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64", }, product_reference: "strongswan-sqlite-5.9.4-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-sqlite-5.9.4-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le", }, product_reference: "strongswan-sqlite-5.9.4-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-sqlite-5.9.4-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x", }, product_reference: "strongswan-sqlite-5.9.4-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "strongswan-sqlite-5.9.4-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64", }, product_reference: "strongswan-sqlite-5.9.4-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2021-41990", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41990", }, ], notes: [ { category: "general", text: "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-41990", url: "https://www.suse.com/security/cve/CVE-2021-41990", }, { category: "external", summary: "SUSE Bug 1191367 for CVE-2021-41990", url: "https://bugzilla.suse.com/1191367", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-41990", }, { cve: "CVE-2021-41991", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-41991", }, ], notes: [ { category: "general", text: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-41991", url: "https://www.suse.com/security/cve/CVE-2021-41991", }, { category: "external", summary: "SUSE Bug 1191367 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191367", }, { category: "external", summary: "SUSE Bug 1191435 for CVE-2021-41991", url: "https://bugzilla.suse.com/1191435", }, { category: "external", summary: "SUSE Bug 1192640 for CVE-2021-41991", url: "https://bugzilla.suse.com/1192640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:strongswan-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-doc-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-hmac-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-ipsec-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-libs0-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-mysql-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-nm-5.9.4-1.1.x86_64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.aarch64", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.ppc64le", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.s390x", "openSUSE Tumbleweed:strongswan-sqlite-5.9.4-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-41991", }, ], }
wid-sec-w-2024-1024
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Strongswan ist eine IPSec-basierte VPN Implementierung.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in strongSwan ausnutzen, um einen Denial of Service Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- Sonstiges\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-1024 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2024-1024.json", }, { category: "self", summary: "WID-SEC-2024-1024 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1024", }, { category: "external", summary: "strongSwan Security Advisory vom 2021-10-18", url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41990).html", }, { category: "external", summary: "strongSwan Security Advisory vom 2021-10-18", url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html", }, { category: "external", summary: "Ubuntu Security Notice USN-5111-1 vom 2021-10-19", url: "https://ubuntu.com/security/notices/USN-5111-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3468-1 vom 2021-10-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009611.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:14827-1 vom 2021-10-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009612.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3467-1 vom 2021-10-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009613.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3469-1 vom 2021-10-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009614.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5111-2 vom 2021-10-19", url: "https://ubuntu.com/security/notices/USN-5111-2", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202405-08 vom 2024-05-04", url: "https://security.gentoo.org/glsa/202405-08", }, ], source_lang: "en-US", title: "strongSwan: Mehrere Schwachstellen ermöglichen Denial of Service", tracking: { current_release_date: "2024-05-05T22:00:00.000+00:00", generator: { date: "2024-08-15T18:08:29.232+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2024-1024", initial_release_date: "2021-10-18T22:00:00.000+00:00", revision_history: [ { date: "2021-10-18T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2021-10-19T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Ubuntu und SUSE aufgenommen", }, { date: "2021-10-21T22:00:00.000+00:00", number: "3", summary: "Referenz(en) aufgenommen: FEDORA-2021-0B37146973, FEDORA-2021-95FAB6A482, FEDORA-2021-B3DF83339E", }, { date: "2024-05-05T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Gentoo aufgenommen", }, ], status: "final", version: "4", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { branches: [ { category: "product_version_range", name: "<5.9.4", product: { name: "Open Source strongSwan <5.9.4", product_id: "T020654", }, }, ], category: "product_name", name: "strongSwan", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2021-41990", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in strongSwan. RSASSA-PSS-Signaturen, deren Parameter eine sehr hohe Salt länge definieren, können einen Integer-Überlauf auslösen, der zu einem Segmentierungsfehler führt. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "T002207", "T000126", "T012167", ], }, release_date: "2021-10-18T22:00:00.000+00:00", title: "CVE-2021-41990", }, { cve: "CVE-2021-41991", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in strongSwan. Sobald der speicherinterne Zertifikats-Cache voll ist, wird versucht, weniger genutzte Einträge zufällig zu ersetzen, was abhängig vom generierten Zufallswert zu einem Integer-Überlauf führen kann. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "T002207", "T000126", "T012167", ], }, release_date: "2021-10-18T22:00:00.000+00:00", title: "CVE-2021-41991", }, ], }
WID-SEC-W-2024-1024
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Strongswan ist eine IPSec-basierte VPN Implementierung.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in strongSwan ausnutzen, um einen Denial of Service Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- Sonstiges\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-1024 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2024-1024.json", }, { category: "self", summary: "WID-SEC-2024-1024 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1024", }, { category: "external", summary: "strongSwan Security Advisory vom 2021-10-18", url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41990).html", }, { category: "external", summary: "strongSwan Security Advisory vom 2021-10-18", url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html", }, { category: "external", summary: "Ubuntu Security Notice USN-5111-1 vom 2021-10-19", url: "https://ubuntu.com/security/notices/USN-5111-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3468-1 vom 2021-10-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009611.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:14827-1 vom 2021-10-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009612.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3467-1 vom 2021-10-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009613.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3469-1 vom 2021-10-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009614.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5111-2 vom 2021-10-19", url: "https://ubuntu.com/security/notices/USN-5111-2", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202405-08 vom 2024-05-04", url: "https://security.gentoo.org/glsa/202405-08", }, ], source_lang: "en-US", title: "strongSwan: Mehrere Schwachstellen ermöglichen Denial of Service", tracking: { current_release_date: "2024-05-05T22:00:00.000+00:00", generator: { date: "2024-08-15T18:08:29.232+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2024-1024", initial_release_date: "2021-10-18T22:00:00.000+00:00", revision_history: [ { date: "2021-10-18T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2021-10-19T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Ubuntu und SUSE aufgenommen", }, { date: "2021-10-21T22:00:00.000+00:00", number: "3", summary: "Referenz(en) aufgenommen: FEDORA-2021-0B37146973, FEDORA-2021-95FAB6A482, FEDORA-2021-B3DF83339E", }, { date: "2024-05-05T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Gentoo aufgenommen", }, ], status: "final", version: "4", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { branches: [ { category: "product_version_range", name: "<5.9.4", product: { name: "Open Source strongSwan <5.9.4", product_id: "T020654", }, }, ], category: "product_name", name: "strongSwan", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2021-41990", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in strongSwan. RSASSA-PSS-Signaturen, deren Parameter eine sehr hohe Salt länge definieren, können einen Integer-Überlauf auslösen, der zu einem Segmentierungsfehler führt. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "T002207", "T000126", "T012167", ], }, release_date: "2021-10-18T22:00:00.000+00:00", title: "CVE-2021-41990", }, { cve: "CVE-2021-41991", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in strongSwan. Sobald der speicherinterne Zertifikats-Cache voll ist, wird versucht, weniger genutzte Einträge zufällig zu ersetzen, was abhängig vom generierten Zufallswert zu einem Integer-Überlauf führen kann. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "T002207", "T000126", "T012167", ], }, release_date: "2021-10-18T22:00:00.000+00:00", title: "CVE-2021-41991", }, ], }
gsd-2021-41991
Vulnerability from gsd
{ GSD: { alias: "CVE-2021-41991", description: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", id: "GSD-2021-41991", references: [ "https://www.suse.com/security/cve/CVE-2021-41991.html", "https://www.debian.org/security/2021/dsa-4989", "https://ubuntu.com/security/CVE-2021-41991", "https://security.archlinux.org/CVE-2021-41991", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-41991", ], details: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", id: "GSD-2021-41991", modified: "2023-12-13T01:23:27.370626Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-41991", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", refsource: "MISC", url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { name: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html", refsource: "CONFIRM", url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html", }, { name: "DSA-4989", refsource: "DEBIAN", url: "https://www.debian.org/security/2021/dsa-4989", }, { name: "[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html", }, { name: "FEDORA-2021-0b37146973", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/", }, { name: "FEDORA-2021-b3df83339e", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/", }, { name: "FEDORA-2021-95fab6a482", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.9.4", versionStartIncluding: "4.2.10", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:siemens:sinema_remote_connect_server:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_sc632-2c_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_sc632-2c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:cp_1543-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_cp_1543sp-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_eu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_cp_1243-7_lte\\/us_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_cp_1243-7_lte\\/us:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_cp_1542sp-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_cp_1542sp-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_sc636-2c_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_sc636-2c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_cp_1542sp-1_irc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_sc642-2c_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_sc642-2c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.3", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_sc646-2c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_sc622-2c_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_sc622-2c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_rail_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1_rail:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-41991", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-190", }, ], }, ], }, references: { reference_data: [ { name: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html", refsource: "CONFIRM", tags: [ "Exploit", "Vendor Advisory", ], url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html", }, { name: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", refsource: "MISC", tags: [ "Third Party Advisory", ], url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { name: "DSA-4989", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4989", }, { name: "[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html", }, { name: "FEDORA-2021-b3df83339e", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/", }, { name: "FEDORA-2021-0b37146973", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/", }, { name: "FEDORA-2021-95fab6a482", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", refsource: "CONFIRM", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, }, }, lastModifiedDate: "2022-04-12T18:42Z", publishedDate: "2021-10-18T14:15Z", }, }, }
ghsa-jpr7-w98h-cvgm
Vulnerability from github
The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.
{ affected: [], aliases: [ "CVE-2021-41991", ], database_specific: { cwe_ids: [ "CWE-190", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2021-10-18T14:15:00Z", severity: "HIGH", }, details: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.", id: "GHSA-jpr7-w98h-cvgm", modified: "2022-05-24T19:17:46Z", published: "2022-05-24T19:17:46Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-41991", }, { type: "WEB", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, { type: "WEB", url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4", }, { type: "WEB", url: "https://www.debian.org/security/2021/dsa-4989", }, { type: "WEB", url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], }
var-202110-1670
Vulnerability from variot
The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility. strongSwan Exists in an integer overflow vulnerability.Denial of service (DoS) It may be put into a state. ========================================================================== Ubuntu Security Notice USN-5111-1 October 19, 2021
strongswan vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.10
- Ubuntu 21.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in strongSwan.
Software Description: - strongswan: IPsec VPN solution
Details:
It was discovered that strongSwan incorrectly handled certain RSASSA-PSS signatures. A remote attacker could use this issue to cause strongSwan to crash, resulting in a denial of service. (CVE-2021-41990)
It was discovered that strongSwan incorrectly handled replacing certificates in the cache. A remote attacker could use this issue to cause strongSwan to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-41991)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.10: libstrongswan 5.9.1-1ubuntu3.1 strongswan 5.9.1-1ubuntu3.1
Ubuntu 21.04: libstrongswan 5.9.1-1ubuntu1.2 strongswan 5.9.1-1ubuntu1.2
Ubuntu 20.04 LTS: libstrongswan 5.8.2-1ubuntu3.3 strongswan 5.8.2-1ubuntu3.3
Ubuntu 18.04 LTS: libstrongswan 5.6.2-1ubuntu2.7 strongswan 5.6.2-1ubuntu2.7
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-5111-1 CVE-2021-41990, CVE-2021-41991
Package Information: https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu3.1 https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu1.2 https://launchpad.net/ubuntu/+source/strongswan/5.8.2-1ubuntu3.3 https://launchpad.net/ubuntu/+source/strongswan/5.6.2-1ubuntu2.7 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-4989-1 security@debian.org https://www.debian.org/security/ Yves-Alexis Perez October 18, 2021 https://www.debian.org/security/faq
Package : strongswan CVE ID : CVE-2021-41990 CVE-2021-41991
Researchers at the United States of America National Security Agency (NSA) identified two denial of services vulnerability in strongSwan, an IKE/IPsec suite.
CVE-2021-41990
RSASSA-PSS signatures whose parameters define a very high salt length can
trigger an integer overflow that can lead to a segmentation fault.
Generating a signature that bypasses the padding check to trigger the crash
requires access to the private key that signed the certificate. However,
the certificate does not have to be trusted. Because the gmp and the
openssl plugins both check if a parsed certificate is self-signed (and the
signature is valid), this can e.g. be triggered by an unrelated
self-signed CA certificate sent by an initiator. Depending on the generated random value, this could
lead to an integer overflow that results in a double-dereference and a call
using out-of-bounds memory that most likely leads to a segmentation fault.
Remote code execution can't be ruled out completely, but attackers have no
control over the dereferenced memory, so it seems unlikely at this point.
For the oldstable distribution (buster), these problems have been fixed in version 5.7.2-1+deb10u1.
For the stable distribution (bullseye), these problems have been fixed in version 5.9.1-1+deb11u1.
We recommend that you upgrade your strongswan packages.
For the detailed security status of strongswan please refer to its security tracker page at: https://security-tracker.debian.org/tracker/strongswan
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAmFtyAUACgkQ3rYcyPpX RFudiwf+NNcRRRJychLI5ycMKVxkr2tEAJDeVZjv966YBM1tXnCtROydXf5Zip2M dn/EYO71uuT5FKhs8tJyx5iv2bFcrvyqQQo6DFQvXZHR0+9U+MHcR9qB7JJDM4nK +JXOEmAv3akCFhiP6jMx5B6jRWR1e4MOwxmgrgGu/nwy2cYBQPI43qPTrXi3Fcnv eSgeyLqyZNLmaGmj8jQfTnc8bdVF5xAs6mHhVqNJxQCdouG9b4/S6AxJsl3IMxyF WZhtCNUvhHH8wz0lZVElR3Qs6fUu0phKdlT9kBv/o6fP3ceiYOCEh8SqBgYU3hQL xyB0uP4EcSR70TvKZMB2jV/tGG1A8w== =/Xvi -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202405-08
https://security.gentoo.org/
Severity: Normal Title: strongSwan: Multiple Vulnerabilities Date: May 04, 2024 Bugs: #818841, #832460, #878887, #899964 ID: 202405-08
Synopsis
Multiple vulnerabilities have been discovered in strongSwan, the worst of which could possibly lead to remote code execution.
Background
strongSwan is an IPSec implementation for Linux.
Affected packages
Package Vulnerable Unaffected
net-vpn/strongswan < 5.9.10 >= 5.9.10
Description
Multiple vulnerabilities have been discovered in strongSwan. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All strongSwan users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-vpn/strongswan-5.9.10"
References
[ 1 ] CVE-2021-41991 https://nvd.nist.gov/vuln/detail/CVE-2021-41991 [ 2 ] CVE-2021-45079 https://nvd.nist.gov/vuln/detail/CVE-2021-45079 [ 3 ] CVE-2022-40617 https://nvd.nist.gov/vuln/detail/CVE-2022-40617 [ 4 ] CVE-2023-26463 https://nvd.nist.gov/vuln/detail/CVE-2023-26463
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202405-08
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1670", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "siplus s7-1200 cp 1243-1 rail", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "strongswan", scope: "lt", trust: 1, vendor: "strongswan", version: "5.9.4", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "10.0", }, { model: "simatic cp 1542sp-1 irc", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "11.0", }, { model: "fedora", scope: "eq", trust: 1, vendor: "fedoraproject", version: "35", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "9.0", }, { model: "fedora", scope: "eq", trust: 1, vendor: "fedoraproject", version: "34", }, { model: "simatic net cp 1545-1", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "simatic cp 1243-1", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "siplus s7-1200 cp 1243-1", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "simatic net cp1243-7 lte eu", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "siplus et 200sp cp 1543sp-1 isec tx rail", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "cp 1543-1", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "scalance sc622-2c", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "scalance sc646-2c", scope: "lt", trust: 1, vendor: "siemens", version: "2.3", }, { model: "strongswan", scope: "gte", trust: 1, vendor: "strongswan", version: "4.2.10", }, { model: "simatic cp 1542sp-1", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "simatic cp 1243-7 lte\\/us", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "siplus et 200sp cp 1543sp-1 isec", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "scalance sc642-2c", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "sinema remote connect server", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "simatic cp 1543sp-1", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "scalance sc632-2c", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "siplus net cp 1543-1", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "scalance sc636-2c", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "fedora", scope: "eq", trust: 1, vendor: "fedoraproject", version: "33", }, { model: "siplus et 200sp cp 1542sp-1 irc tx rail", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "simatic net cp 1243-8 irc", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "simatic cp 1242-7 gprs v2", scope: "eq", trust: 1, vendor: "siemens", version: null, }, { model: "fedora", scope: null, trust: 0.8, vendor: "fedora", version: null, }, { model: "gnu/linux", scope: null, trust: 0.8, vendor: "debian", version: null, }, { model: "strongswan", scope: null, trust: 0.8, vendor: "strongswan", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-007493", }, { db: "NVD", id: "CVE-2021-41991", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.9.4", versionStartIncluding: "4.2.10", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:siemens:sinema_remote_connect_server:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_sc632-2c_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_sc632-2c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:cp_1543-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_cp_1543sp-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_eu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_cp_1243-7_lte\\/us_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_cp_1243-7_lte\\/us:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_cp_1542sp-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_cp_1542sp-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_sc636-2c_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_sc636-2c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:simatic_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:simatic_cp_1542sp-1_irc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_sc642-2c_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_sc642-2c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.3", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_sc646-2c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_sc622-2c_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_sc622-2c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_rail_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1_rail:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2021-41991", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Ubuntu", sources: [ { db: "PACKETSTORM", id: "164558", }, { db: "PACKETSTORM", id: "164554", }, ], trust: 0.2, }, cve: "CVE-2021-41991", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 5, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2021-41991", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.9, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "VHN-403107", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 7.5, baseSeverity: "High", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2021-41991", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2021-41991", trust: 1.8, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-202110-1214", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-403107", trust: 0.1, value: "MEDIUM", }, { author: "VULMON", id: "CVE-2021-41991", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-403107", }, { db: "VULMON", id: "CVE-2021-41991", }, { db: "JVNDB", id: "JVNDB-2021-007493", }, { db: "CNNVD", id: "CNNVD-202110-1214", }, { db: "NVD", id: "CVE-2021-41991", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility. strongSwan Exists in an integer overflow vulnerability.Denial of service (DoS) It may be put into a state. ==========================================================================\nUbuntu Security Notice USN-5111-1\nOctober 19, 2021\n\nstrongswan vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 21.10\n- Ubuntu 21.04\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in strongSwan. \n\nSoftware Description:\n- strongswan: IPsec VPN solution\n\nDetails:\n\nIt was discovered that strongSwan incorrectly handled certain RSASSA-PSS\nsignatures. A remote attacker could use this issue to cause strongSwan to\ncrash, resulting in a denial of service. (CVE-2021-41990)\n\nIt was discovered that strongSwan incorrectly handled replacing\ncertificates in the cache. A remote attacker could use this issue to cause\nstrongSwan to crash, resulting in a denial of service, or possibly execute\narbitrary code. (CVE-2021-41991)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 21.10:\n libstrongswan 5.9.1-1ubuntu3.1\n strongswan 5.9.1-1ubuntu3.1\n\nUbuntu 21.04:\n libstrongswan 5.9.1-1ubuntu1.2\n strongswan 5.9.1-1ubuntu1.2\n\nUbuntu 20.04 LTS:\n libstrongswan 5.8.2-1ubuntu3.3\n strongswan 5.8.2-1ubuntu3.3\n\nUbuntu 18.04 LTS:\n libstrongswan 5.6.2-1ubuntu2.7\n strongswan 5.6.2-1ubuntu2.7\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n https://ubuntu.com/security/notices/USN-5111-1\n CVE-2021-41990, CVE-2021-41991\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu3.1\n https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu1.2\n https://launchpad.net/ubuntu/+source/strongswan/5.8.2-1ubuntu3.3\n https://launchpad.net/ubuntu/+source/strongswan/5.6.2-1ubuntu2.7\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4989-1 security@debian.org\nhttps://www.debian.org/security/ Yves-Alexis Perez\nOctober 18, 2021 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : strongswan\nCVE ID : CVE-2021-41990 CVE-2021-41991\n\nResearchers at the United States of America National Security Agency (NSA)\nidentified two denial of services vulnerability in strongSwan, an IKE/IPsec\nsuite. \n\nCVE-2021-41990\n\n RSASSA-PSS signatures whose parameters define a very high salt length can\n trigger an integer overflow that can lead to a segmentation fault. \n Generating a signature that bypasses the padding check to trigger the crash\n requires access to the private key that signed the certificate. However,\n the certificate does not have to be trusted. Because the gmp and the\n openssl plugins both check if a parsed certificate is self-signed (and the\n signature is valid), this can e.g. be triggered by an unrelated\n self-signed CA certificate sent by an initiator. Depending on the generated random value, this could\n lead to an integer overflow that results in a double-dereference and a call\n using out-of-bounds memory that most likely leads to a segmentation fault. \n Remote code execution can't be ruled out completely, but attackers have no\n control over the dereferenced memory, so it seems unlikely at this point. \n\nFor the oldstable distribution (buster), these problems have been fixed\nin version 5.7.2-1+deb10u1. \n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 5.9.1-1+deb11u1. \n\nWe recommend that you upgrade your strongswan packages. \n\nFor the detailed security status of strongswan please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/strongswan\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n\niQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAmFtyAUACgkQ3rYcyPpX\nRFudiwf+NNcRRRJychLI5ycMKVxkr2tEAJDeVZjv966YBM1tXnCtROydXf5Zip2M\ndn/EYO71uuT5FKhs8tJyx5iv2bFcrvyqQQo6DFQvXZHR0+9U+MHcR9qB7JJDM4nK\n+JXOEmAv3akCFhiP6jMx5B6jRWR1e4MOwxmgrgGu/nwy2cYBQPI43qPTrXi3Fcnv\neSgeyLqyZNLmaGmj8jQfTnc8bdVF5xAs6mHhVqNJxQCdouG9b4/S6AxJsl3IMxyF\nWZhtCNUvhHH8wz0lZVElR3Qs6fUu0phKdlT9kBv/o6fP3ceiYOCEh8SqBgYU3hQL\nxyB0uP4EcSR70TvKZMB2jV/tGG1A8w==\n=/Xvi\n-----END PGP SIGNATURE-----\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202405-08\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: strongSwan: Multiple Vulnerabilities\n Date: May 04, 2024\n Bugs: #818841, #832460, #878887, #899964\n ID: 202405-08\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n=======\nMultiple vulnerabilities have been discovered in strongSwan, the worst\nof which could possibly lead to remote code execution. \n\nBackground\n=========\nstrongSwan is an IPSec implementation for Linux. \n\nAffected packages\n================\nPackage Vulnerable Unaffected\n------------------ ------------ ------------\nnet-vpn/strongswan < 5.9.10 >= 5.9.10\n\nDescription\n==========\nMultiple vulnerabilities have been discovered in strongSwan. Please\nreview the CVE identifiers referenced below for details. \n\nImpact\n=====\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n=========\nThere is no known workaround at this time. \n\nResolution\n=========\nAll strongSwan users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-vpn/strongswan-5.9.10\"\n\nReferences\n=========\n[ 1 ] CVE-2021-41991\n https://nvd.nist.gov/vuln/detail/CVE-2021-41991\n[ 2 ] CVE-2021-45079\n https://nvd.nist.gov/vuln/detail/CVE-2021-45079\n[ 3 ] CVE-2022-40617\n https://nvd.nist.gov/vuln/detail/CVE-2022-40617\n[ 4 ] CVE-2023-26463\n https://nvd.nist.gov/vuln/detail/CVE-2023-26463\n\nAvailability\n===========\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202405-08\n\nConcerns?\n========\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n======\nCopyright 2024 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n", sources: [ { db: "NVD", id: "CVE-2021-41991", }, { db: "JVNDB", id: "JVNDB-2021-007493", }, { db: "VULHUB", id: "VHN-403107", }, { db: "VULMON", id: "CVE-2021-41991", }, { db: "PACKETSTORM", id: "164558", }, { db: "PACKETSTORM", id: "164554", }, { db: "PACKETSTORM", id: "169143", }, { db: "PACKETSTORM", id: "178454", }, ], trust: 2.16, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2021-41991", trust: 3.8, }, { db: "SIEMENS", id: "SSA-539476", trust: 1.7, }, { db: "JVN", id: "JVNVU98748974", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2021-007493", trust: 0.8, }, { db: "PACKETSTORM", id: "164558", trust: 0.7, }, { db: "PACKETSTORM", id: "164554", trust: 0.7, }, { db: "CS-HELP", id: "SB2021101947", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.3463", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.3488", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202110-1214", trust: 0.6, }, { db: "VULHUB", id: "VHN-403107", trust: 0.1, }, { db: "VULMON", id: "CVE-2021-41991", trust: 0.1, }, { db: "PACKETSTORM", id: "169143", trust: 0.1, }, { db: "PACKETSTORM", id: "178454", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-403107", }, { db: "VULMON", id: "CVE-2021-41991", }, { db: "JVNDB", id: "JVNDB-2021-007493", }, { db: "PACKETSTORM", id: "164558", }, { db: "PACKETSTORM", id: "164554", }, { db: "PACKETSTORM", id: "169143", }, { db: "PACKETSTORM", id: "178454", }, { db: "CNNVD", id: "CNNVD-202110-1214", }, { db: "NVD", id: "CVE-2021-41991", }, ], }, id: "VAR-202110-1670", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-403107", }, ], trust: 0.7219727133333333, }, last_update_date: "2024-05-12T01:52:15.827000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "strongSwan Vulnerability (CVE-2021-41991)", trust: 0.8, url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html", }, { title: "strongSwan Enter the fix for the verification error vulnerability", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=166640", }, { title: "Debian Security Advisories: DSA-4989-1 strongswan -- security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=35fdad388753f5d88f528a33acdb09b3", }, { title: "Red Hat: CVE-2021-41991", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=cve-2021-41991", }, { title: "Arch Linux Issues: ", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=cve-2021-41991 log", }, ], sources: [ { db: "VULMON", id: "CVE-2021-41991", }, { db: "JVNDB", id: "JVNDB-2021-007493", }, { db: "CNNVD", id: "CNNVD-202110-1214", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-190", trust: 1.1, }, { problemtype: "Integer overflow or wraparound (CWE-190) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "VULHUB", id: "VHN-403107", }, { db: "JVNDB", id: "JVNDB-2021-007493", }, { db: "NVD", id: "CVE-2021-41991", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.9, url: "https://www.debian.org/security/2021/dsa-4989", }, { trust: 1.8, url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { trust: 1.8, url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html", }, { trust: 1.8, url: "https://nvd.nist.gov/vuln/detail/cve-2021-41991", }, { trust: 1.7, url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, { trust: 1.1, url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html", }, { trust: 1, url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5fjsatd2r2xhtg4p63gcmq2n7ewkmme5/", }, { trust: 1, url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/wqsq3bec22nf4ncdzvct4p3q2ziajxgj/", }, { trust: 1, url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/y3tq32jljobjdb2ejksx2pbpb5nfg2d4/", }, { trust: 0.8, url: "https://jvn.jp/vu/jvnvu98748974/", }, { trust: 0.7, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5fjsatd2r2xhtg4p63gcmq2n7ewkmme5/", }, { trust: 0.7, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/y3tq32jljobjdb2ejksx2pbpb5nfg2d4/", }, { trust: 0.7, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/wqsq3bec22nf4ncdzvct4p3q2ziajxgj/", }, { trust: 0.7, url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2021-41991", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/strongswan-integer-overflow-via-in-memory-certificate-cache-36667", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.3463", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/164558/ubuntu-security-notice-usn-5111-2.html", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2021101947", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.3488", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/164554/ubuntu-security-notice-usn-5111-1.html", }, { trust: 0.2, url: "https://ubuntu.com/security/notices/usn-5111-1", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2021-41990", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/190.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://ubuntu.com/security/notices/usn-5111-2", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu3.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/strongswan/5.8.2-1ubuntu3.3", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu1.2", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/strongswan/5.6.2-1ubuntu2.7", }, { trust: 0.1, url: "https://www.debian.org/security/faq", }, { trust: 0.1, url: "https://www.debian.org/security/", }, { trust: 0.1, url: "https://security-tracker.debian.org/tracker/strongswan", }, { trust: 0.1, url: "https://security.gentoo.org/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-45079", }, { trust: 0.1, url: "https://bugs.gentoo.org.", }, { trust: 0.1, url: "https://creativecommons.org/licenses/by-sa/2.5", }, { trust: 0.1, url: "https://security.gentoo.org/glsa/202405-08", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-40617", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-26463", }, ], sources: [ { db: "VULHUB", id: "VHN-403107", }, { db: "VULMON", id: "CVE-2021-41991", }, { db: "JVNDB", id: "JVNDB-2021-007493", }, { db: "PACKETSTORM", id: "164558", }, { db: "PACKETSTORM", id: "164554", }, { db: "PACKETSTORM", id: "169143", }, { db: "PACKETSTORM", id: "178454", }, { db: "CNNVD", id: "CNNVD-202110-1214", }, { db: "NVD", id: "CVE-2021-41991", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-403107", }, { db: "VULMON", id: "CVE-2021-41991", }, { db: "JVNDB", id: "JVNDB-2021-007493", }, { db: "PACKETSTORM", id: "164558", }, { db: "PACKETSTORM", id: "164554", }, { db: "PACKETSTORM", id: "169143", }, { db: "PACKETSTORM", id: "178454", }, { db: "CNNVD", id: "CNNVD-202110-1214", }, { db: "NVD", id: "CVE-2021-41991", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-10-18T00:00:00", db: "VULHUB", id: "VHN-403107", }, { date: "2021-10-18T00:00:00", db: "VULMON", id: "CVE-2021-41991", }, { date: "2022-02-15T00:00:00", db: "JVNDB", id: "JVNDB-2021-007493", }, { date: "2021-10-20T15:43:57", db: "PACKETSTORM", id: "164558", }, { date: "2021-10-19T15:31:42", db: "PACKETSTORM", id: "164554", }, { date: "2021-10-28T19:12:00", db: "PACKETSTORM", id: "169143", }, { date: "2024-05-06T13:54:27", db: "PACKETSTORM", id: "178454", }, { date: "2021-10-18T00:00:00", db: "CNNVD", id: "CNNVD-202110-1214", }, { date: "2021-10-18T14:15:10.333000", db: "NVD", id: "CVE-2021-41991", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-04-12T00:00:00", db: "VULHUB", id: "VHN-403107", }, { date: "2021-10-21T00:00:00", db: "VULMON", id: "CVE-2021-41991", }, { date: "2022-02-15T00:53:00", db: "JVNDB", id: "JVNDB-2021-007493", }, { date: "2022-02-09T00:00:00", db: "CNNVD", id: "CNNVD-202110-1214", }, { date: "2023-11-07T03:39:05.350000", db: "NVD", id: "CVE-2021-41991", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "PACKETSTORM", id: "164558", }, { db: "PACKETSTORM", id: "164554", }, { db: "PACKETSTORM", id: "178454", }, { db: "CNNVD", id: "CNNVD-202110-1214", }, ], trust: 0.9, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "strongSwan Integer overflow vulnerability in", sources: [ { db: "JVNDB", id: "JVNDB-2021-007493", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "input validation error", sources: [ { db: "CNNVD", id: "CNNVD-202110-1214", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.