OPENSUSE-SU-2024:10579-1

Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00
Summary
strongswan-5.3.5-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: strongswan-5.3.5-1.1 on GA media
Description of the patch: These are all security issues fixed in the strongswan-5.3.5-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-10579
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/o… self
https://www.suse.com/security/cve/CVE-2009-0790/ self
https://www.suse.com/security/cve/CVE-2012-2388/ self
https://www.suse.com/security/cve/CVE-2013-2944/ self
https://www.suse.com/security/cve/CVE-2013-5018/ self
https://www.suse.com/security/cve/CVE-2013-6075/ self
https://www.suse.com/security/cve/CVE-2013-6076/ self
https://www.suse.com/security/cve/CVE-2014-2338/ self
https://www.suse.com/security/cve/CVE-2014-9221/ self
https://www.suse.com/security/cve/CVE-2015-3991/ self
https://www.suse.com/security/cve/CVE-2015-4171/ self
https://www.suse.com/security/cve/CVE-2015-8023/ self
https://www.suse.com/security/cve/CVE-2009-0790 external
https://bugzilla.suse.com/487762 external
https://www.suse.com/security/cve/CVE-2012-2388 external
https://bugzilla.suse.com/1107874 external
https://bugzilla.suse.com/761325 external
https://bugzilla.suse.com/815236 external
https://www.suse.com/security/cve/CVE-2013-2944 external
https://bugzilla.suse.com/815236 external
https://www.suse.com/security/cve/CVE-2013-5018 external
https://bugzilla.suse.com/833278 external
https://www.suse.com/security/cve/CVE-2013-6075 external
https://bugzilla.suse.com/847506 external
https://www.suse.com/security/cve/CVE-2013-6076 external
https://bugzilla.suse.com/847509 external
https://www.suse.com/security/cve/CVE-2014-2338 external
https://bugzilla.suse.com/870572 external
https://www.suse.com/security/cve/CVE-2014-9221 external
https://bugzilla.suse.com/910491 external
https://www.suse.com/security/cve/CVE-2015-3991 external
https://bugzilla.suse.com/931272 external
https://www.suse.com/security/cve/CVE-2015-4171 external
https://bugzilla.suse.com/931845 external
https://bugzilla.suse.com/933591 external
https://www.suse.com/security/cve/CVE-2015-8023 external
https://bugzilla.suse.com/953817 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "strongswan-5.3.5-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the strongswan-5.3.5-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-10579",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10579-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2009-0790 page",
        "url": "https://www.suse.com/security/cve/CVE-2009-0790/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2012-2388 page",
        "url": "https://www.suse.com/security/cve/CVE-2012-2388/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2944 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2944/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-5018 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-5018/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6075 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6075/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6076 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6076/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-2338 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-2338/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-9221 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-9221/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-3991 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-3991/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-4171 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-4171/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-8023 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-8023/"
      }
    ],
    "title": "strongswan-5.3.5-1.1 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:10579-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "strongswan-5.3.5-1.1.aarch64",
                "product": {
                  "name": "strongswan-5.3.5-1.1.aarch64",
                  "product_id": "strongswan-5.3.5-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-doc-5.3.5-1.1.aarch64",
                "product": {
                  "name": "strongswan-doc-5.3.5-1.1.aarch64",
                  "product_id": "strongswan-doc-5.3.5-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-hmac-5.3.5-1.1.aarch64",
                "product": {
                  "name": "strongswan-hmac-5.3.5-1.1.aarch64",
                  "product_id": "strongswan-hmac-5.3.5-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-ipsec-5.3.5-1.1.aarch64",
                "product": {
                  "name": "strongswan-ipsec-5.3.5-1.1.aarch64",
                  "product_id": "strongswan-ipsec-5.3.5-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-libs0-5.3.5-1.1.aarch64",
                "product": {
                  "name": "strongswan-libs0-5.3.5-1.1.aarch64",
                  "product_id": "strongswan-libs0-5.3.5-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-mysql-5.3.5-1.1.aarch64",
                "product": {
                  "name": "strongswan-mysql-5.3.5-1.1.aarch64",
                  "product_id": "strongswan-mysql-5.3.5-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-nm-5.3.5-1.1.aarch64",
                "product": {
                  "name": "strongswan-nm-5.3.5-1.1.aarch64",
                  "product_id": "strongswan-nm-5.3.5-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-sqlite-5.3.5-1.1.aarch64",
                "product": {
                  "name": "strongswan-sqlite-5.3.5-1.1.aarch64",
                  "product_id": "strongswan-sqlite-5.3.5-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "strongswan-5.3.5-1.1.ppc64le",
                "product": {
                  "name": "strongswan-5.3.5-1.1.ppc64le",
                  "product_id": "strongswan-5.3.5-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-doc-5.3.5-1.1.ppc64le",
                "product": {
                  "name": "strongswan-doc-5.3.5-1.1.ppc64le",
                  "product_id": "strongswan-doc-5.3.5-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-hmac-5.3.5-1.1.ppc64le",
                "product": {
                  "name": "strongswan-hmac-5.3.5-1.1.ppc64le",
                  "product_id": "strongswan-hmac-5.3.5-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-ipsec-5.3.5-1.1.ppc64le",
                "product": {
                  "name": "strongswan-ipsec-5.3.5-1.1.ppc64le",
                  "product_id": "strongswan-ipsec-5.3.5-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-libs0-5.3.5-1.1.ppc64le",
                "product": {
                  "name": "strongswan-libs0-5.3.5-1.1.ppc64le",
                  "product_id": "strongswan-libs0-5.3.5-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-mysql-5.3.5-1.1.ppc64le",
                "product": {
                  "name": "strongswan-mysql-5.3.5-1.1.ppc64le",
                  "product_id": "strongswan-mysql-5.3.5-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-nm-5.3.5-1.1.ppc64le",
                "product": {
                  "name": "strongswan-nm-5.3.5-1.1.ppc64le",
                  "product_id": "strongswan-nm-5.3.5-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-sqlite-5.3.5-1.1.ppc64le",
                "product": {
                  "name": "strongswan-sqlite-5.3.5-1.1.ppc64le",
                  "product_id": "strongswan-sqlite-5.3.5-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "strongswan-5.3.5-1.1.s390x",
                "product": {
                  "name": "strongswan-5.3.5-1.1.s390x",
                  "product_id": "strongswan-5.3.5-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-doc-5.3.5-1.1.s390x",
                "product": {
                  "name": "strongswan-doc-5.3.5-1.1.s390x",
                  "product_id": "strongswan-doc-5.3.5-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-hmac-5.3.5-1.1.s390x",
                "product": {
                  "name": "strongswan-hmac-5.3.5-1.1.s390x",
                  "product_id": "strongswan-hmac-5.3.5-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-ipsec-5.3.5-1.1.s390x",
                "product": {
                  "name": "strongswan-ipsec-5.3.5-1.1.s390x",
                  "product_id": "strongswan-ipsec-5.3.5-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-libs0-5.3.5-1.1.s390x",
                "product": {
                  "name": "strongswan-libs0-5.3.5-1.1.s390x",
                  "product_id": "strongswan-libs0-5.3.5-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-mysql-5.3.5-1.1.s390x",
                "product": {
                  "name": "strongswan-mysql-5.3.5-1.1.s390x",
                  "product_id": "strongswan-mysql-5.3.5-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-nm-5.3.5-1.1.s390x",
                "product": {
                  "name": "strongswan-nm-5.3.5-1.1.s390x",
                  "product_id": "strongswan-nm-5.3.5-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-sqlite-5.3.5-1.1.s390x",
                "product": {
                  "name": "strongswan-sqlite-5.3.5-1.1.s390x",
                  "product_id": "strongswan-sqlite-5.3.5-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "strongswan-5.3.5-1.1.x86_64",
                "product": {
                  "name": "strongswan-5.3.5-1.1.x86_64",
                  "product_id": "strongswan-5.3.5-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-doc-5.3.5-1.1.x86_64",
                "product": {
                  "name": "strongswan-doc-5.3.5-1.1.x86_64",
                  "product_id": "strongswan-doc-5.3.5-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-hmac-5.3.5-1.1.x86_64",
                "product": {
                  "name": "strongswan-hmac-5.3.5-1.1.x86_64",
                  "product_id": "strongswan-hmac-5.3.5-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-ipsec-5.3.5-1.1.x86_64",
                "product": {
                  "name": "strongswan-ipsec-5.3.5-1.1.x86_64",
                  "product_id": "strongswan-ipsec-5.3.5-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-libs0-5.3.5-1.1.x86_64",
                "product": {
                  "name": "strongswan-libs0-5.3.5-1.1.x86_64",
                  "product_id": "strongswan-libs0-5.3.5-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-mysql-5.3.5-1.1.x86_64",
                "product": {
                  "name": "strongswan-mysql-5.3.5-1.1.x86_64",
                  "product_id": "strongswan-mysql-5.3.5-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-nm-5.3.5-1.1.x86_64",
                "product": {
                  "name": "strongswan-nm-5.3.5-1.1.x86_64",
                  "product_id": "strongswan-nm-5.3.5-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "strongswan-sqlite-5.3.5-1.1.x86_64",
                "product": {
                  "name": "strongswan-sqlite-5.3.5-1.1.x86_64",
                  "product_id": "strongswan-sqlite-5.3.5-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-5.3.5-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64"
        },
        "product_reference": "strongswan-5.3.5-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-5.3.5-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le"
        },
        "product_reference": "strongswan-5.3.5-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-5.3.5-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x"
        },
        "product_reference": "strongswan-5.3.5-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-5.3.5-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64"
        },
        "product_reference": "strongswan-5.3.5-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-doc-5.3.5-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64"
        },
        "product_reference": "strongswan-doc-5.3.5-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-doc-5.3.5-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le"
        },
        "product_reference": "strongswan-doc-5.3.5-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-doc-5.3.5-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x"
        },
        "product_reference": "strongswan-doc-5.3.5-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-doc-5.3.5-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64"
        },
        "product_reference": "strongswan-doc-5.3.5-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-hmac-5.3.5-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64"
        },
        "product_reference": "strongswan-hmac-5.3.5-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-hmac-5.3.5-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le"
        },
        "product_reference": "strongswan-hmac-5.3.5-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-hmac-5.3.5-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x"
        },
        "product_reference": "strongswan-hmac-5.3.5-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-hmac-5.3.5-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64"
        },
        "product_reference": "strongswan-hmac-5.3.5-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-ipsec-5.3.5-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64"
        },
        "product_reference": "strongswan-ipsec-5.3.5-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-ipsec-5.3.5-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le"
        },
        "product_reference": "strongswan-ipsec-5.3.5-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-ipsec-5.3.5-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x"
        },
        "product_reference": "strongswan-ipsec-5.3.5-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-ipsec-5.3.5-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64"
        },
        "product_reference": "strongswan-ipsec-5.3.5-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-libs0-5.3.5-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64"
        },
        "product_reference": "strongswan-libs0-5.3.5-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-libs0-5.3.5-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le"
        },
        "product_reference": "strongswan-libs0-5.3.5-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-libs0-5.3.5-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x"
        },
        "product_reference": "strongswan-libs0-5.3.5-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-libs0-5.3.5-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64"
        },
        "product_reference": "strongswan-libs0-5.3.5-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-mysql-5.3.5-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64"
        },
        "product_reference": "strongswan-mysql-5.3.5-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-mysql-5.3.5-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le"
        },
        "product_reference": "strongswan-mysql-5.3.5-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-mysql-5.3.5-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x"
        },
        "product_reference": "strongswan-mysql-5.3.5-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-mysql-5.3.5-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64"
        },
        "product_reference": "strongswan-mysql-5.3.5-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-nm-5.3.5-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64"
        },
        "product_reference": "strongswan-nm-5.3.5-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-nm-5.3.5-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le"
        },
        "product_reference": "strongswan-nm-5.3.5-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-nm-5.3.5-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x"
        },
        "product_reference": "strongswan-nm-5.3.5-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-nm-5.3.5-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64"
        },
        "product_reference": "strongswan-nm-5.3.5-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-sqlite-5.3.5-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64"
        },
        "product_reference": "strongswan-sqlite-5.3.5-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-sqlite-5.3.5-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le"
        },
        "product_reference": "strongswan-sqlite-5.3.5-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-sqlite-5.3.5-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x"
        },
        "product_reference": "strongswan-sqlite-5.3.5-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "strongswan-sqlite-5.3.5-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
        },
        "product_reference": "strongswan-sqlite-5.3.5-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-0790",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2009-0790"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2009-0790",
          "url": "https://www.suse.com/security/cve/CVE-2009-0790"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 487762 for CVE-2009-0790",
          "url": "https://bugzilla.suse.com/487762"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2009-0790"
    },
    {
      "cve": "CVE-2012-2388",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2012-2388"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The GMP Plugin in strongSwan 4.2.0 through 4.6.3 allows remote attackers to bypass authentication via a (1) empty or (2) zeroed RSA signature, aka \"RSA signature verification vulnerability.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2012-2388",
          "url": "https://www.suse.com/security/cve/CVE-2012-2388"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1107874 for CVE-2012-2388",
          "url": "https://bugzilla.suse.com/1107874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 761325 for CVE-2012-2388",
          "url": "https://bugzilla.suse.com/761325"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 815236 for CVE-2012-2388",
          "url": "https://bugzilla.suse.com/815236"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2012-2388"
    },
    {
      "cve": "CVE-2013-2944",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2944"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "strongSwan 4.3.5 through 5.0.3, when using the OpenSSL plugin for ECDSA signature verification, allows remote attackers to authenticate as other users via an invalid signature.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2944",
          "url": "https://www.suse.com/security/cve/CVE-2013-2944"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 815236 for CVE-2013-2944",
          "url": "https://bugzilla.suse.com/815236"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-2944"
    },
    {
      "cve": "CVE-2013-5018",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-5018"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-5018",
          "url": "https://www.suse.com/security/cve/CVE-2013-5018"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 833278 for CVE-2013-5018",
          "url": "https://bugzilla.suse.com/833278"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-5018"
    },
    {
      "cve": "CVE-2013-6075",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6075"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The compare_dn function in utils/identification.c in strongSwan 4.3.3 through 5.1.1 allows (1) remote attackers to cause a denial of service (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2) remote authenticated users to impersonate arbitrary users and bypass access restrictions via a crafted ID_DER_ASN1_DN ID, related to an \"insufficient length check\" during identity comparison.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6075",
          "url": "https://www.suse.com/security/cve/CVE-2013-6075"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 847506 for CVE-2013-6075",
          "url": "https://bugzilla.suse.com/847506"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2013-6075"
    },
    {
      "cve": "CVE-2013-6076",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6076"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "strongSwan 5.0.2 through 5.1.0 allows remote attackers to cause a denial of service (NULL pointer dereference and charon daemon crash) via a crafted IKEv1 fragmentation packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6076",
          "url": "https://www.suse.com/security/cve/CVE-2013-6076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 847509 for CVE-2013-6076",
          "url": "https://bugzilla.suse.com/847509"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2013-6076"
    },
    {
      "cve": "CVE-2014-2338",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-2338"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-2338",
          "url": "https://www.suse.com/security/cve/CVE-2014-2338"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 870572 for CVE-2014-2338",
          "url": "https://bugzilla.suse.com/870572"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-2338"
    },
    {
      "cve": "CVE-2014-9221",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-9221"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "strongSwan 4.5.x through 5.2.x before 5.2.1 allows remote attackers to cause a denial of service (invalid pointer dereference) via a crafted IKEv2 Key Exchange (KE) message with Diffie-Hellman (DH) group 1025.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-9221",
          "url": "https://www.suse.com/security/cve/CVE-2014-9221"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 910491 for CVE-2014-9221",
          "url": "https://bugzilla.suse.com/910491"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-9221"
    },
    {
      "cve": "CVE-2015-3991",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-3991"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "strongSwan 5.2.2 and 5.3.0 allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-3991",
          "url": "https://www.suse.com/security/cve/CVE-2015-3991"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 931272 for CVE-2015-3991",
          "url": "https://bugzilla.suse.com/931272"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2015-3991"
    },
    {
      "cve": "CVE-2015-4171",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-4171"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-4171",
          "url": "https://www.suse.com/security/cve/CVE-2015-4171"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 931845 for CVE-2015-4171",
          "url": "https://bugzilla.suse.com/931845"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 933591 for CVE-2015-4171",
          "url": "https://bugzilla.suse.com/933591"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-4171"
    },
    {
      "cve": "CVE-2015-8023",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-8023"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
          "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-8023",
          "url": "https://www.suse.com/security/cve/CVE-2015-8023"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 953817 for CVE-2015-8023",
          "url": "https://bugzilla.suse.com/953817"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-doc-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-hmac-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-ipsec-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-libs0-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-mysql-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-nm-5.3.5-1.1.x86_64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.aarch64",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.ppc64le",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.s390x",
            "openSUSE Tumbleweed:strongswan-sqlite-5.3.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2015-8023"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…