{"affected":[{"ecosystem_specific":{"binaries":[{"strongswan":"5.6.0-4.3.2","strongswan-doc":"5.6.0-4.3.2","strongswan-hmac":"5.6.0-4.3.2","strongswan-ipsec":"5.6.0-4.3.2","strongswan-libs0":"5.6.0-4.3.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15","name":"strongswan","purl":"pkg:rpm/suse/strongswan&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.6.0-4.3.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"strongswan":"5.6.0-4.3.2","strongswan-doc":"5.6.0-4.3.2","strongswan-hmac":"5.6.0-4.3.2","strongswan-ipsec":"5.6.0-4.3.2","strongswan-libs0":"5.6.0-4.3.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP1","name":"strongswan","purl":"pkg:rpm/suse/strongswan&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.6.0-4.3.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"strongswan-nm":"5.6.0-4.3.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Package Hub 15","name":"strongswan","purl":"pkg:rpm/suse/strongswan&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.6.0-4.3.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for strongswan fixes the following issues:\n\nSecurity issues fixed: \n\n- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker \n  with local user credentials to resource exhaustion and denial of service while \n  reading from the socket (bsc#1094462).\n- CVE-2018-10811: Fixed a denial of service during  the IKEv2 key derivation if \n  the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF \n  (bsc#1093536).\n- CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin which \n  might lead to authorization bypass (bsc#1107874).\n- CVE-2018-17540: Fixed an improper input validation in gmp plugin (bsc#1109845).  \n","id":"SUSE-SU-2019:3056-1","modified":"2019-11-25T16:30:01Z","published":"2019-11-25T16:30:01Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2019/suse-su-20193056-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1093536"},{"type":"REPORT","url":"https://bugzilla.suse.com/1094462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1107874"},{"type":"REPORT","url":"https://bugzilla.suse.com/1109845"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-10811"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16151"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16152"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-17540"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-5388"}],"related":["CVE-2018-10811","CVE-2018-16151","CVE-2018-16152","CVE-2018-17540","CVE-2018-5388"],"summary":"Security update for strongswan","upstream":["CVE-2018-10811","CVE-2018-16151","CVE-2018-16152","CVE-2018-17540","CVE-2018-5388"]}