Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-6466
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.444Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" }, { "name": "65155", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65155" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2017-001" }, { "name": "RHSA-2014:0185", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html" }, { "name": "DSA-2893", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2893" }, { "name": "openswan-cve20136466-dos(90524)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-16T13:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" }, { "name": "65155", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65155" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2017-001" }, { "name": "RHSA-2014:0185", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html" }, { "name": "DSA-2893", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2893" }, { "name": "openswan-cve20136466-dos(90524)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6466", "datePublished": "2014-01-26T20:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-6466\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-01-26T20:55:05.330\",\"lastModified\":\"2024-11-21T01:59:17.140\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.\"},{\"lang\":\"es\",\"value\":\"Openswan v2.6.39 y anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero nulo y reinicio del demonio IKE) a trav\u00e9s de paquetes IKEv2 que cuenten con payloads esperados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.39\",\"matchCriteriaId\":\"0383946F-A466-43FD-81D5-5B0E4BDBB969\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39C5F91B-EE8A-4A81-A21D-68A3F4295200\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"112D7B10-50E4-4903-9E34-DB4857D6C658\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7841F42-1226-43C4-A007-88847925D872\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77930F86-13FF-4787-A39F-2D00110AFBFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1ADD64-2503-4EED-9F6F-E425A3406123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3067BE9-4314-42BD-8131-89C4899F7D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E00CA6E5-1F63-4D59-BA72-0F8697671718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35A2049-8502-41F2-894E-E39AEBEB6816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1109A84D-1815-4A7B-8EDA-E493A1973224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B20531A3-F6F8-4FE1-9C0A-FDFABAC4C6AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F212AE-D5B3-4A88-A1E6-00A13A0A2AD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD82E956-8C8E-4B38-9E82-4AA9AEFE6891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D0F0EA4-A0DF-48CC-9B42-465A36945503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8945D2A7-B1C3-4981-B840-FB046AB6F4B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338E969E-2CC6-44F3-A938-EE7131375AB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0F3C93D-0575-4BAF-955A-C74D0C141523\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DEFAF6E-FFEF-46A3-99C1-F95ACBDB78F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*\",\"matchCriteriaId\":\"8350D73B-8E0F-4A47-BAF0-8760DAB15FE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BB58EA0-D9DB-4E15-9A15-E36340AC8336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C97FA4D4-3804-4171-AF3F-3417438B3991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BE96833-5A92-4DFD-952D-DA9E89EBFD4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A8774D7-E8B3-487F-BB2F-26819D43B9B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB7BA36B-D16C-424F-AB2B-F2377C27EEC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EBF6E8F-345B-464E-AF42-2023ADAD24AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BE8382-1C52-497B-9CF7-FBE1F62FF393\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14846867-EC43-4643-A746-E6FF74A257E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06D3BE33-7C68-4B69-84CA-DEC5C9EEA1D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45E28D36-D8F1-4801-AAC8-822A983EC8FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E818F98-46A4-46F0-9150-1BC2AFAA9AC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"657A6290-B56C-480A-B333-E80116CEB22E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3064E8F-D635-4EA3-A2CA-83F38CABFDD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBDB2792-C463-4E0A-BE7A-BDE5BE63EDEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C403BE3B-DEA3-4B14-907E-2801101465F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D9CF872-EF59-4686-BF3C-A35AAB987E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"069A54BF-45EE-4C42-BBB7-7488F0FFB78F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBC5D566-407A-4F38-9E04-37AADFD6E5DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08A80BD0-685C-4C7A-AD32-BF8763A4DBFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44FC55F9-B802-4843-8590-B24BE51CEABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DE9DD89-B625-47B1-A7C8-0E2B934C2F55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78325087-599F-448B-8C47-570914FF6C59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"059CFA5C-B262-47AF-94A6-8E74AFB19204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12F25627-235B-4312-80A4-4E36DE0E72A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3E70B88-6348-42BB-AE96-46BDB1F3C6FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A9DF25-48E8-4D52-A267-1BE0437E9000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C986533F-E320-46FA-A9F7-DAFDB1A0628A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C77DED4-2696-4172-92B7-43034E61F845\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED1BA7D-B603-49D4-9080-4A9FEC056A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"207B98DB-5962-4F62-AF5B-D48EF0C0E2A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB65639-AE3A-4984-93F9-2A8100DCEE6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8921D08-FBA3-4C0A-8944-362909C5EB6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FBD5312-E44F-4996-AA29-AFED53A90E8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B24C96-47DF-4FA2-8DF4-8241F4964F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5067B83-AB9E-4819-B5A2-B14A96EB54C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"773B9BB2-0F65-4604-AF2C-8AC396DDC094\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA892169-0079-48D9-AEF5-641748CE1BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A7E9A23-65D9-4C3D-BF2D-007D3428DE2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41815E9-08BC-49ED-9016-5FE804DCC779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FA99146-7368-44B6-B7B4-3D77741E5A7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0EF3852-4889-49F0-8D56-1E1FF1E811D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D734AD8D-AE91-47C7-BD4D-467CFB63D163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE595B96-0618-4DF3-B7C3-479A1DD02670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F38B9927-1918-4380-8265-E8915D49AECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3A8294-58D5-429D-9061-EE897AAAED80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFAFF39D-126F-4984-A40B-88E94C680141\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73EE725B-C26E-4343-B5F2-F5DF31A197C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A26D9508-E43D-4BA2-9734-CDABBD405D26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01D11526-6DCD-4B73-BACC-FC619D92BBB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24641D2D-BB95-4E26-AD96-8CE96B6B3976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A24A87F0-AE9A-46DB-8E47-7819E18513CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13460979-98A3-4873-B9E4-86327F9C2B2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB91B1E2-12F5-4DE1-95D8-400196730902\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3F3F1A-8EA5-4065-84F8-3DBC5E4A8F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3662B940-BE1F-4CB5-B341-2E3DE8954064\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0185.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2893\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/65155\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2017-001\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/90524\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0185.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2893\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/65155\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2017-001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/90524\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}],\"evaluatorComment\":\"Per: http://cwe.mitre.org/data/definitions/476.html\\n\\n\\\"CWE-476: NULL Pointer Dereference\\\"\"}}" } }
ghsa-gc3w-rhj3-96v9
Vulnerability from github
Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.
{ "affected": [], "aliases": [ "CVE-2013-6466" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-01-26T20:55:00Z", "severity": "MODERATE" }, "details": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.", "id": "GHSA-gc3w-rhj3-96v9", "modified": "2022-05-14T00:55:33Z", "published": "2022-05-14T00:55:33Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6466" }, { "type": "WEB", "url": "https://cert.vde.com/en-us/advisories/vde-2017-001" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524" }, { "type": "WEB", "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-2893" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/65155" } ], "schema_version": "1.4.0", "severity": [] }
var-201401-0259
Vulnerability from variot
Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. Openswan is a VPN implemented using ipsec technology. Openswan is prone to a remote denial-of-service vulnerability. An attacker may exploit this issue to restart the application, resulting in a denial-of-service condition to legitimate users. Openswan 2.6.39 and prior are vulnerable.
CVE-2013-2053
During an audit of Libreswan (with which Openswan shares some code),
Florian Weimer found a remote buffer overflow in the atodn()
function. This vulnerability can be triggered when Opportunistic
Encryption (OE) is enabled and an attacker controls the PTR record
of a peer IP address.
Authentication is not needed to trigger the vulnerability.
CVE-2013-6466
Iustina Melinte found a vulnerability in Libreswan which also
applies to the Openswan code. By carefuly crafting IKEv2 packets, an
attacker can make the pluto daemon derefeences non-received IKEv2
payload, leading to the daemon crash.
Authentication is not needed to trigger the vulnerability.
Patches were originally written to fix the vulnerabilities in Libreswan, and have been ported to Openswan by Paul Wouters from the Libreswan Project.
Since the Openswan package is not maintained anymore in the Debian distribution and is not available in testing and unstable suites, it is recommended for IKE/IPsec users to switch to a supported implementation like strongSwan.
For the oldstable distribution (squeeze), these problems have been fixed in version 2.6.28+dfsg-5+squeeze2.
For the stable distribution (wheezy), these problems have been fixed in version 2.6.37-3.1.
We recommend that you upgrade your openswan packages. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: openswan security update Advisory ID: RHSA-2014:0185-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0185.html Issue date: 2014-02-18 CVE Names: CVE-2013-6466 =====================================================================
- Summary:
Updated openswan packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
Openswan is a free implementation of Internet Protocol Security (IPsec) and Internet Key Exchange (IKE). IPsec uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. (CVE-2013-6466)
All openswan users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1050277 - CVE-2013-6466 openswan: dereferencing missing IKEv2 payloads causes pluto daemon to restart
- Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/openswan-2.6.32-7.3.el5_10.src.rpm
i386: openswan-2.6.32-7.3.el5_10.i386.rpm openswan-debuginfo-2.6.32-7.3.el5_10.i386.rpm openswan-doc-2.6.32-7.3.el5_10.i386.rpm
x86_64: openswan-2.6.32-7.3.el5_10.x86_64.rpm openswan-debuginfo-2.6.32-7.3.el5_10.x86_64.rpm openswan-doc-2.6.32-7.3.el5_10.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/openswan-2.6.32-7.3.el5_10.src.rpm
i386: openswan-2.6.32-7.3.el5_10.i386.rpm openswan-debuginfo-2.6.32-7.3.el5_10.i386.rpm openswan-doc-2.6.32-7.3.el5_10.i386.rpm
ia64: openswan-2.6.32-7.3.el5_10.ia64.rpm openswan-debuginfo-2.6.32-7.3.el5_10.ia64.rpm openswan-doc-2.6.32-7.3.el5_10.ia64.rpm
ppc: openswan-2.6.32-7.3.el5_10.ppc.rpm openswan-debuginfo-2.6.32-7.3.el5_10.ppc.rpm openswan-doc-2.6.32-7.3.el5_10.ppc.rpm
s390x: openswan-2.6.32-7.3.el5_10.s390x.rpm openswan-debuginfo-2.6.32-7.3.el5_10.s390x.rpm openswan-doc-2.6.32-7.3.el5_10.s390x.rpm
x86_64: openswan-2.6.32-7.3.el5_10.x86_64.rpm openswan-debuginfo-2.6.32-7.3.el5_10.x86_64.rpm openswan-doc-2.6.32-7.3.el5_10.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm
i386: openswan-2.6.32-27.2.el6_5.i686.rpm openswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm
x86_64: openswan-2.6.32-27.2.el6_5.x86_64.rpm openswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm
i386: openswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm openswan-doc-2.6.32-27.2.el6_5.i686.rpm
x86_64: openswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm openswan-doc-2.6.32-27.2.el6_5.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm
i386: openswan-2.6.32-27.2.el6_5.i686.rpm openswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm
ppc64: openswan-2.6.32-27.2.el6_5.ppc64.rpm openswan-debuginfo-2.6.32-27.2.el6_5.ppc64.rpm
s390x: openswan-2.6.32-27.2.el6_5.s390x.rpm openswan-debuginfo-2.6.32-27.2.el6_5.s390x.rpm
x86_64: openswan-2.6.32-27.2.el6_5.x86_64.rpm openswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm
i386: openswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm openswan-doc-2.6.32-27.2.el6_5.i686.rpm
ppc64: openswan-debuginfo-2.6.32-27.2.el6_5.ppc64.rpm openswan-doc-2.6.32-27.2.el6_5.ppc64.rpm
s390x: openswan-debuginfo-2.6.32-27.2.el6_5.s390x.rpm openswan-doc-2.6.32-27.2.el6_5.s390x.rpm
x86_64: openswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm openswan-doc-2.6.32-27.2.el6_5.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm
i386: openswan-2.6.32-27.2.el6_5.i686.rpm openswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm
x86_64: openswan-2.6.32-27.2.el6_5.x86_64.rpm openswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm
i386: openswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm openswan-doc-2.6.32-27.2.el6_5.i686.rpm
x86_64: openswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm openswan-doc-2.6.32-27.2.el6_5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2013-6466.html https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFTA6D7XlSAg2UNWIIRAkO0AKCCIbfDJPZuuXS7U6rZU8/CimQlxwCeIPUb dpyjtxp6hcgn2NES8FPSOkw= =jFWA -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Background
Openswan is an implementation of IPsec for Linux.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/openswan <= 2.6.39-r1 Vulnerable! ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers.
Impact
A remote attacker could create a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
Gentoo has discontinued support for Openswan. We recommend that users unmerge Openswan:
# emerge --unmerge "net-misc/openswan"
NOTE: The Gentoo developer(s) maintaining Openswan have discontinued support at this time. It may be possible that a new Gentoo developer will update Openswan at a later date. Alternatives packages such as Libreswan and strongSwan are currently available in Gentoo Portage.
References
[ 1 ] CVE-2013-6466 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6466
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-07.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201401-0259", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.06" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.17" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.0" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.09" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.13" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.14" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.18" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.21" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.13" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.08" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.9" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.3.0" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.28" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.20" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.24" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.07" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.0" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.33" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.12" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.19" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.31" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.04" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.03" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.35" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.05" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.04" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.32" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.11" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.14" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.8" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.12" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.4" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.29" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.07" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.01" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.16" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.27" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.2" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.23" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.7" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.6" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.30" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.25" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.16" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.13" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.01" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.06" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.11" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.3" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.15" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.10" }, { "model": "openswan", "scope": "lte", "trust": 1.0, "vendor": "xelerance", "version": "2.6.39" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.1" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.36" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.17" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.3.1" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.08" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.02" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.02" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.22" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.10" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.18" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.34" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.03" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.37" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.38" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.5" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.11" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.12" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.15" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.26" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.10" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.05" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.09" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.38" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.37" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.34" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.31" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.30" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.39" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.36" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.35" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.33" }, { "model": "openswan", "scope": "lte", "trust": 0.8, "vendor": "openswan", "version": "2.6.39" }, { "model": "openswan", "scope": "eq", "trust": 0.6, "vendor": "openswan", "version": "3.7" }, { "model": "openswan", "scope": "eq", "trust": 0.6, "vendor": "openswan", "version": "2.6.32" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "contact fl mguard smart2 vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard smart2 vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard smart2", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard smart2", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs4004 tx/dtx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs4004 tx/dtx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs4004 tx/dtx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs4004 tx/dtx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs4000 tx/tx-p", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs4000 tx/tx-p", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs4000 tx/tx vpn-m", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs4000 tx/tx vpn-m", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs4000 tx/tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs4000 tx/tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs4000 tx/tx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs4000 tx/tx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs2005 tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs2005 tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs2000 tx/tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs2000 tx/tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs vpn analog", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs vpn analog", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard pcie4000 vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard pcie4000 vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard pci4000 vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard pci4000 vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard pci4000", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard pci4000", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard gt/gt vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard gt/gt vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard gt/gt", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard gt/gt", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard delta tx/tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard delta tx/tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard delta tx/tx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard delta tx/tx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard centerport", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard centerport", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.24" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.23" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.22" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.21" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.20" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.19" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.18" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.17" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.16" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.15" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.14" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.2" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.29" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.28" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.27" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.26" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.25" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.13" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.12" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.11" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.10" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.09" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.08" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.07" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.06" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.05" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.04" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.03" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.01" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "contact fl mguard smart2 vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard smart2", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs4004 tx/dtx vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs4004 tx/dtx", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs4000 tx/tx-p", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs4000 tx/tx vpn-m", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs4000 tx/tx vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs4000 tx/tx", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs2005 tx vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs2000 tx/tx vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs vpn analog", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard pcie4000 vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard pci4000 vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard pci4000", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard gt/gt vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard gt/gt", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard delta tx/tx vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard delta tx/tx", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard centerport", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "BID", "id": "65155" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "CNNVD", "id": "CNNVD-201401-547" }, { "db": "NVD", "id": "CVE-2013-6466" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:openswan:openswan", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005932" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Iustina Melinte", "sources": [ { "db": "BID", "id": "65155" } ], "trust": 0.3 }, "cve": "CVE-2013-6466", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2013-6466", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2014-00690", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-6466", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2013-6466", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2014-00690", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201401-547", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "CNNVD", "id": "CNNVD-201401-547" }, { "db": "NVD", "id": "CVE-2013-6466" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. Openswan is a VPN implemented using ipsec technology. Openswan is prone to a remote denial-of-service vulnerability. \nAn attacker may exploit this issue to restart the application, resulting in a denial-of-service condition to legitimate users. \nOpenswan 2.6.39 and prior are vulnerable. \n\nCVE-2013-2053\n\n During an audit of Libreswan (with which Openswan shares some code),\n Florian Weimer found a remote buffer overflow in the atodn()\n function. This vulnerability can be triggered when Opportunistic\n Encryption (OE) is enabled and an attacker controls the PTR record\n of a peer IP address. \n Authentication is not needed to trigger the vulnerability. \n\nCVE-2013-6466\n\n Iustina Melinte found a vulnerability in Libreswan which also\n applies to the Openswan code. By carefuly crafting IKEv2 packets, an\n attacker can make the pluto daemon derefeences non-received IKEv2\n payload, leading to the daemon crash. \n Authentication is not needed to trigger the vulnerability. \n\nPatches were originally written to fix the vulnerabilities in Libreswan,\nand have been ported to Openswan by Paul Wouters from the Libreswan\nProject. \n\nSince the Openswan package is not maintained anymore in the Debian\ndistribution and is not available in testing and unstable suites, it is\nrecommended for IKE/IPsec users to switch to a supported implementation\nlike strongSwan. \n\nFor the oldstable distribution (squeeze), these problems have been fixed in\nversion 2.6.28+dfsg-5+squeeze2. \n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 2.6.37-3.1. \n\nWe recommend that you upgrade your openswan packages. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: openswan security update\nAdvisory ID: RHSA-2014:0185-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-0185.html\nIssue date: 2014-02-18\nCVE Names: CVE-2013-6466 \n=====================================================================\n\n1. Summary:\n\nUpdated openswan packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5 and 6. \n\nThe Red Hat Security Response Team has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nOpenswan is a free implementation of Internet Protocol Security (IPsec) and\nInternet Key Exchange (IKE). IPsec uses strong cryptography to provide both\nauthentication and encryption services. These services allow you to build\nsecure tunnels through untrusted networks. (CVE-2013-6466)\n\nAll openswan users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1050277 - CVE-2013-6466 openswan: dereferencing missing IKEv2 payloads causes pluto daemon to restart\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/openswan-2.6.32-7.3.el5_10.src.rpm\n\ni386:\nopenswan-2.6.32-7.3.el5_10.i386.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.i386.rpm\nopenswan-doc-2.6.32-7.3.el5_10.i386.rpm\n\nx86_64:\nopenswan-2.6.32-7.3.el5_10.x86_64.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.x86_64.rpm\nopenswan-doc-2.6.32-7.3.el5_10.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/openswan-2.6.32-7.3.el5_10.src.rpm\n\ni386:\nopenswan-2.6.32-7.3.el5_10.i386.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.i386.rpm\nopenswan-doc-2.6.32-7.3.el5_10.i386.rpm\n\nia64:\nopenswan-2.6.32-7.3.el5_10.ia64.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.ia64.rpm\nopenswan-doc-2.6.32-7.3.el5_10.ia64.rpm\n\nppc:\nopenswan-2.6.32-7.3.el5_10.ppc.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.ppc.rpm\nopenswan-doc-2.6.32-7.3.el5_10.ppc.rpm\n\ns390x:\nopenswan-2.6.32-7.3.el5_10.s390x.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.s390x.rpm\nopenswan-doc-2.6.32-7.3.el5_10.s390x.rpm\n\nx86_64:\nopenswan-2.6.32-7.3.el5_10.x86_64.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.x86_64.rpm\nopenswan-doc-2.6.32-7.3.el5_10.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm\n\ni386:\nopenswan-2.6.32-27.2.el6_5.i686.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm\n\nx86_64:\nopenswan-2.6.32-27.2.el6_5.x86_64.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm\n\ni386:\nopenswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm\nopenswan-doc-2.6.32-27.2.el6_5.i686.rpm\n\nx86_64:\nopenswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm\nopenswan-doc-2.6.32-27.2.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm\n\ni386:\nopenswan-2.6.32-27.2.el6_5.i686.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm\n\nppc64:\nopenswan-2.6.32-27.2.el6_5.ppc64.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.ppc64.rpm\n\ns390x:\nopenswan-2.6.32-27.2.el6_5.s390x.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.s390x.rpm\n\nx86_64:\nopenswan-2.6.32-27.2.el6_5.x86_64.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm\n\ni386:\nopenswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm\nopenswan-doc-2.6.32-27.2.el6_5.i686.rpm\n\nppc64:\nopenswan-debuginfo-2.6.32-27.2.el6_5.ppc64.rpm\nopenswan-doc-2.6.32-27.2.el6_5.ppc64.rpm\n\ns390x:\nopenswan-debuginfo-2.6.32-27.2.el6_5.s390x.rpm\nopenswan-doc-2.6.32-27.2.el6_5.s390x.rpm\n\nx86_64:\nopenswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm\nopenswan-doc-2.6.32-27.2.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm\n\ni386:\nopenswan-2.6.32-27.2.el6_5.i686.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm\n\nx86_64:\nopenswan-2.6.32-27.2.el6_5.x86_64.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm\n\ni386:\nopenswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm\nopenswan-doc-2.6.32-27.2.el6_5.i686.rpm\n\nx86_64:\nopenswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm\nopenswan-doc-2.6.32-27.2.el6_5.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2013-6466.html\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFTA6D7XlSAg2UNWIIRAkO0AKCCIbfDJPZuuXS7U6rZU8/CimQlxwCeIPUb\ndpyjtxp6hcgn2NES8FPSOkw=\n=jFWA\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nBackground\n==========\n\nOpenswan is an implementation of IPsec for Linux. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/openswan \u003c= 2.6.39-r1 Vulnerable!\n -------------------------------------------------------------------\n NOTE: Certain packages are still vulnerable. Users should migrate\n to another package if one is available or wait for the\n existing packages to be marked stable by their\n architecture maintainers. \n\nImpact\n======\n\nA remote attacker could create a Denial of Service condition. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nGentoo has discontinued support for Openswan. We recommend that users\nunmerge Openswan:\n\n # emerge --unmerge \"net-misc/openswan\"\n\nNOTE: The Gentoo developer(s) maintaining Openswan have discontinued\nsupport at this time. It may be possible that a new Gentoo developer\nwill update Openswan at a later date. Alternatives packages such as\nLibreswan and strongSwan are currently available in Gentoo Portage. \n\nReferences\n==========\n\n[ 1 ] CVE-2013-6466\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6466\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201411-07.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n", "sources": [ { "db": "NVD", "id": "CVE-2013-6466" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "BID", "id": "65155" }, { "db": "PACKETSTORM", "id": "125973" }, { "db": "PACKETSTORM", "id": "125264" }, { "db": "PACKETSTORM", "id": "129235" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-6466", "trust": 3.6 }, { "db": "BID", "id": "65155", "trust": 2.5 }, { "db": "CERT@VDE", "id": "VDE-2017-001", "trust": 1.6 }, { "db": "ICS CERT", "id": "ICSA-17-250-02", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2013-005932", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2014-00690", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201401-547", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "125973", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "125264", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129235", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "BID", "id": "65155" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "PACKETSTORM", "id": "125973" }, { "db": "PACKETSTORM", "id": "125264" }, { "db": "PACKETSTORM", "id": "129235" }, { "db": "CNNVD", "id": "CNNVD-201401-547" }, { "db": "NVD", "id": "CVE-2013-6466" } ] }, "id": "VAR-201401-0259", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" } ] }, "last_update_date": "2024-11-23T20:41:38.875000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2013-6467 Libreswan dereferencing missing IKEv2 payloads causes restart", "trust": 0.8, "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.openswan.org/" }, { "title": "RHSA-2014:0185", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2014-0185.html" }, { "title": "Patch for Openswan IKEv2 Load Remote Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/43206" }, { "title": "openswan-latest", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47728" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "CNNVD", "id": "CNNVD-201401-547" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "NVD", "id": "CVE-2013-6466" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://libreswan.org/security/cve-2013-6467/cve-2013-6467.txt" }, { "trust": 1.7, "url": "http://rhn.redhat.com/errata/rhsa-2014-0185.html" }, { "trust": 1.6, "url": "http://www.debian.org/security/2014/dsa-2893" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/65155" }, { "trust": 1.6, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524" }, { "trust": 1.6, "url": "https://cert.vde.com/en-us/advisories/vde-2017-001" }, { "trust": 1.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-250-02" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6466" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6466" }, { "trust": 0.3, "url": "http://www.openswan.org/" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100178570" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6466" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2053" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://access.redhat.com/site/articles/11258" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-6466.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6466" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201411-07.xml" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "BID", "id": "65155" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "PACKETSTORM", "id": "125973" }, { "db": "PACKETSTORM", "id": "125264" }, { "db": "PACKETSTORM", "id": "129235" }, { "db": "CNNVD", "id": "CNNVD-201401-547" }, { "db": "NVD", "id": "CVE-2013-6466" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "BID", "id": "65155" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "PACKETSTORM", "id": "125973" }, { "db": "PACKETSTORM", "id": "125264" }, { "db": "PACKETSTORM", "id": "129235" }, { "db": "CNNVD", "id": "CNNVD-201401-547" }, { "db": "NVD", "id": "CVE-2013-6466" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-01-29T00:00:00", "db": "CNVD", "id": "CNVD-2014-00690" }, { "date": "2014-01-27T00:00:00", "db": "BID", "id": "65155" }, { "date": "2014-01-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "date": "2014-04-01T19:02:00", "db": "PACKETSTORM", "id": "125973" }, { "date": "2014-02-19T02:48:29", "db": "PACKETSTORM", "id": "125264" }, { "date": "2014-11-24T13:32:00", "db": "PACKETSTORM", "id": "129235" }, { "date": "2014-01-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-547" }, { "date": "2014-01-26T20:55:05.330000", "db": "NVD", "id": "CVE-2013-6466" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-02-13T00:00:00", "db": "CNVD", "id": "CNVD-2014-00690" }, { "date": "2017-09-08T13:13:00", "db": "BID", "id": "65155" }, { "date": "2017-09-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "date": "2019-07-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-547" }, { "date": "2024-11-21T01:59:17.140000", "db": "NVD", "id": "CVE-2013-6466" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "125264" }, { "db": "PACKETSTORM", "id": "129235" }, { "db": "CNNVD", "id": "CNNVD-201401-547" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Openswan Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005932" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201401-547" } ], "trust": 0.6 } }
RHSA-2014:0185
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openswan packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Openswan is a free implementation of Internet Protocol Security (IPsec) and\nInternet Key Exchange (IKE). IPsec uses strong cryptography to provide both\nauthentication and encryption services. These services allow you to build\nsecure tunnels through untrusted networks.\n\nA NULL pointer dereference flaw was discovered in the way Openswan\u0027s IKE\ndaemon processed IKEv2 payloads. A remote attacker could send specially\ncrafted IKEv2 payloads that, when processed, would lead to a denial of\nservice (daemon crash), possibly causing existing VPN connections to be\ndropped. (CVE-2013-6466)\n\nAll openswan users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0185", "url": "https://access.redhat.com/errata/RHSA-2014:0185" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1050277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050277" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0185.json" } ], "title": "Red Hat Security Advisory: openswan security update", "tracking": { "current_release_date": "2024-11-22T07:26:26+00:00", "generator": { "date": "2024-11-22T07:26:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0185", "initial_release_date": "2014-02-18T17:55:46+00:00", "revision_history": [ { "date": "2014-02-18T17:55:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-02-18T17:55:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:26:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.src", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.src", "product_id": "openswan-0:2.6.32-27.2.el6_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=src" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.src", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.src", "product_id": "openswan-0:2.6.32-7.3.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "product": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "product_id": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-27.2.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "product": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "product_id": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-27.2.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.x86_64", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64", "product_id": "openswan-0:2.6.32-27.2.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.x86_64", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.x86_64", "product_id": "openswan-0:2.6.32-7.3.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "product": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "product_id": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-27.2.el6_5?arch=i686" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "product": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "product_id": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-27.2.el6_5?arch=i686" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.i686", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.i686", "product_id": "openswan-0:2.6.32-27.2.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "product": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "product_id": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-27.2.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "product": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "product_id": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-27.2.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.ppc64", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64", "product_id": "openswan-0:2.6.32-27.2.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "product": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "product_id": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-27.2.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "product": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "product_id": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-27.2.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.s390x", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x", "product_id": "openswan-0:2.6.32-27.2.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.s390x", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.s390x", "product_id": "openswan-0:2.6.32-7.3.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.ia64", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.ia64", "product_id": "openswan-0:2.6.32-7.3.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.i386", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.i386", "product_id": "openswan-0:2.6.32-7.3.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=i386" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=i386" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.ppc", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.ppc", "product_id": "openswan-0:2.6.32-7.3.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-6466", "discovery_date": "2014-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1050277" } ], "notes": [ { "category": "description", "text": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.", "title": "Vulnerability description" }, { "category": "summary", "text": "openswan: dereferencing missing IKEv2 payloads causes pluto daemon to restart", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6466" }, { "category": "external", "summary": "RHBZ#1050277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050277" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6466", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6466" }, { "category": "external", "summary": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt", "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" } ], "release_date": "2014-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-02-18T17:55:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0185" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openswan: dereferencing missing IKEv2 payloads causes pluto daemon to restart" } ] }
rhsa-2014_0185
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openswan packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Openswan is a free implementation of Internet Protocol Security (IPsec) and\nInternet Key Exchange (IKE). IPsec uses strong cryptography to provide both\nauthentication and encryption services. These services allow you to build\nsecure tunnels through untrusted networks.\n\nA NULL pointer dereference flaw was discovered in the way Openswan\u0027s IKE\ndaemon processed IKEv2 payloads. A remote attacker could send specially\ncrafted IKEv2 payloads that, when processed, would lead to a denial of\nservice (daemon crash), possibly causing existing VPN connections to be\ndropped. (CVE-2013-6466)\n\nAll openswan users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0185", "url": "https://access.redhat.com/errata/RHSA-2014:0185" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1050277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050277" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0185.json" } ], "title": "Red Hat Security Advisory: openswan security update", "tracking": { "current_release_date": "2024-11-22T07:26:26+00:00", "generator": { "date": "2024-11-22T07:26:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0185", "initial_release_date": "2014-02-18T17:55:46+00:00", "revision_history": [ { "date": "2014-02-18T17:55:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-02-18T17:55:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:26:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.src", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.src", "product_id": "openswan-0:2.6.32-27.2.el6_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=src" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.src", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.src", "product_id": "openswan-0:2.6.32-7.3.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "product": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "product_id": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-27.2.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "product": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "product_id": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-27.2.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.x86_64", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64", "product_id": "openswan-0:2.6.32-27.2.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.x86_64", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.x86_64", "product_id": "openswan-0:2.6.32-7.3.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "product": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "product_id": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-27.2.el6_5?arch=i686" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "product": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "product_id": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-27.2.el6_5?arch=i686" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.i686", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.i686", "product_id": "openswan-0:2.6.32-27.2.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "product": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "product_id": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-27.2.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "product": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "product_id": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-27.2.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.ppc64", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64", "product_id": "openswan-0:2.6.32-27.2.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "product": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "product_id": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-27.2.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "product": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "product_id": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-27.2.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.s390x", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x", "product_id": "openswan-0:2.6.32-27.2.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.s390x", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.s390x", "product_id": "openswan-0:2.6.32-7.3.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.ia64", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.ia64", "product_id": "openswan-0:2.6.32-7.3.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.i386", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.i386", "product_id": "openswan-0:2.6.32-7.3.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=i386" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=i386" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.ppc", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.ppc", "product_id": "openswan-0:2.6.32-7.3.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-6466", "discovery_date": "2014-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1050277" } ], "notes": [ { "category": "description", "text": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.", "title": "Vulnerability description" }, { "category": "summary", "text": "openswan: dereferencing missing IKEv2 payloads causes pluto daemon to restart", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6466" }, { "category": "external", "summary": "RHBZ#1050277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050277" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6466", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6466" }, { "category": "external", "summary": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt", "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" } ], "release_date": "2014-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-02-18T17:55:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0185" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openswan: dereferencing missing IKEv2 payloads causes pluto daemon to restart" } ] }
rhsa-2014:0185
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openswan packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Openswan is a free implementation of Internet Protocol Security (IPsec) and\nInternet Key Exchange (IKE). IPsec uses strong cryptography to provide both\nauthentication and encryption services. These services allow you to build\nsecure tunnels through untrusted networks.\n\nA NULL pointer dereference flaw was discovered in the way Openswan\u0027s IKE\ndaemon processed IKEv2 payloads. A remote attacker could send specially\ncrafted IKEv2 payloads that, when processed, would lead to a denial of\nservice (daemon crash), possibly causing existing VPN connections to be\ndropped. (CVE-2013-6466)\n\nAll openswan users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0185", "url": "https://access.redhat.com/errata/RHSA-2014:0185" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1050277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050277" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0185.json" } ], "title": "Red Hat Security Advisory: openswan security update", "tracking": { "current_release_date": "2024-11-22T07:26:26+00:00", "generator": { "date": "2024-11-22T07:26:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0185", "initial_release_date": "2014-02-18T17:55:46+00:00", "revision_history": [ { "date": "2014-02-18T17:55:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-02-18T17:55:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:26:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.src", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.src", "product_id": "openswan-0:2.6.32-27.2.el6_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=src" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.src", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.src", "product_id": "openswan-0:2.6.32-7.3.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "product": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "product_id": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-27.2.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "product": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "product_id": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-27.2.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.x86_64", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64", "product_id": "openswan-0:2.6.32-27.2.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.x86_64", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.x86_64", "product_id": "openswan-0:2.6.32-7.3.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "product": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "product_id": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-27.2.el6_5?arch=i686" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "product": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "product_id": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-27.2.el6_5?arch=i686" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.i686", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.i686", "product_id": "openswan-0:2.6.32-27.2.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "product": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "product_id": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-27.2.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "product": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "product_id": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-27.2.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.ppc64", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64", "product_id": "openswan-0:2.6.32-27.2.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "product": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "product_id": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-27.2.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "product": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "product_id": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-27.2.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-27.2.el6_5.s390x", "product": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x", "product_id": "openswan-0:2.6.32-27.2.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-27.2.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.s390x", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.s390x", "product_id": "openswan-0:2.6.32-7.3.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.ia64", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.ia64", "product_id": "openswan-0:2.6.32-7.3.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.i386", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.i386", "product_id": "openswan-0:2.6.32-7.3.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=i386" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=i386" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openswan-0:2.6.32-7.3.el5_10.ppc", "product": { "name": "openswan-0:2.6.32-7.3.el5_10.ppc", "product_id": "openswan-0:2.6.32-7.3.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan@2.6.32-7.3.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "product": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "product_id": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-doc@2.6.32-7.3.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "product": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "product_id": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openswan-debuginfo@2.6.32-7.3.el5_10?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.src", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" }, "product_reference": "openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-6466", "discovery_date": "2014-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1050277" } ], "notes": [ { "category": "description", "text": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.", "title": "Vulnerability description" }, { "category": "summary", "text": "openswan: dereferencing missing IKEv2 payloads causes pluto daemon to restart", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6466" }, { "category": "external", "summary": "RHBZ#1050277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050277" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6466", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6466" }, { "category": "external", "summary": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt", "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" } ], "release_date": "2014-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-02-18T17:55:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0185" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Client-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Client-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.src", "5Server-5.10.Z:openswan-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-debuginfo-0:2.6.32-7.3.el5_10.x86_64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.i386", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ia64", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.ppc", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.s390x", "5Server-5.10.Z:openswan-doc-0:2.6.32-7.3.el5_10.x86_64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Client-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Client-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Server-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Server-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.src", "6Workstation-optional-6.5.z:openswan-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-debuginfo-0:2.6.32-27.2.el6_5.x86_64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.i686", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.ppc64", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.s390x", "6Workstation-optional-6.5.z:openswan-doc-0:2.6.32-27.2.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openswan: dereferencing missing IKEv2 payloads causes pluto daemon to restart" } ] }
fkie_cve-2013-6466
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*", "matchCriteriaId": "0383946F-A466-43FD-81D5-5B0E4BDBB969", "versionEndIncluding": "2.6.39", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "39C5F91B-EE8A-4A81-A21D-68A3F4295200", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "112D7B10-50E4-4903-9E34-DB4857D6C658", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7841F42-1226-43C4-A007-88847925D872", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "77930F86-13FF-4787-A39F-2D00110AFBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B1ADD64-2503-4EED-9F6F-E425A3406123", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3067BE9-4314-42BD-8131-89C4899F7D47", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "E00CA6E5-1F63-4D59-BA72-0F8697671718", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "C35A2049-8502-41F2-894E-E39AEBEB6816", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "1109A84D-1815-4A7B-8EDA-E493A1973224", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B20531A3-F6F8-4FE1-9C0A-FDFABAC4C6AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9F212AE-D5B3-4A88-A1E6-00A13A0A2AD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "DD82E956-8C8E-4B38-9E82-4AA9AEFE6891", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "2D0F0EA4-A0DF-48CC-9B42-465A36945503", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "8945D2A7-B1C3-4981-B840-FB046AB6F4B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "338E969E-2CC6-44F3-A938-EE7131375AB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "A0F3C93D-0575-4BAF-955A-C74D0C141523", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7DEFAF6E-FFEF-46A3-99C1-F95ACBDB78F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*", "matchCriteriaId": "8350D73B-8E0F-4A47-BAF0-8760DAB15FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*", "matchCriteriaId": "4BB58EA0-D9DB-4E15-9A15-E36340AC8336", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*", "matchCriteriaId": "C97FA4D4-3804-4171-AF3F-3417438B3991", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*", "matchCriteriaId": "0BE96833-5A92-4DFD-952D-DA9E89EBFD4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*", "matchCriteriaId": "6A8774D7-E8B3-487F-BB2F-26819D43B9B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*", "matchCriteriaId": "AB7BA36B-D16C-424F-AB2B-F2377C27EEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*", "matchCriteriaId": "0EBF6E8F-345B-464E-AF42-2023ADAD24AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*", "matchCriteriaId": "01BE8382-1C52-497B-9CF7-FBE1F62FF393", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*", "matchCriteriaId": "14846867-EC43-4643-A746-E6FF74A257E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*", "matchCriteriaId": "06D3BE33-7C68-4B69-84CA-DEC5C9EEA1D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*", "matchCriteriaId": "45E28D36-D8F1-4801-AAC8-822A983EC8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "4E818F98-46A4-46F0-9150-1BC2AFAA9AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "657A6290-B56C-480A-B333-E80116CEB22E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "C3064E8F-D635-4EA3-A2CA-83F38CABFDD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "CBDB2792-C463-4E0A-BE7A-BDE5BE63EDEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "C403BE3B-DEA3-4B14-907E-2801101465F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "5D9CF872-EF59-4686-BF3C-A35AAB987E76", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "069A54BF-45EE-4C42-BBB7-7488F0FFB78F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "EBC5D566-407A-4F38-9E04-37AADFD6E5DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "08A80BD0-685C-4C7A-AD32-BF8763A4DBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*", "matchCriteriaId": "44FC55F9-B802-4843-8590-B24BE51CEABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*", "matchCriteriaId": "1DE9DD89-B625-47B1-A7C8-0E2B934C2F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*", "matchCriteriaId": "78325087-599F-448B-8C47-570914FF6C59", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*", "matchCriteriaId": "059CFA5C-B262-47AF-94A6-8E74AFB19204", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*", "matchCriteriaId": "12F25627-235B-4312-80A4-4E36DE0E72A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*", "matchCriteriaId": "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*", "matchCriteriaId": "12A9DF25-48E8-4D52-A267-1BE0437E9000", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*", "matchCriteriaId": "C986533F-E320-46FA-A9F7-DAFDB1A0628A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*", "matchCriteriaId": "7C77DED4-2696-4172-92B7-43034E61F845", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "BED1BA7D-B603-49D4-9080-4A9FEC056A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "DFB65639-AE3A-4984-93F9-2A8100DCEE6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "B8921D08-FBA3-4C0A-8944-362909C5EB6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "3FBD5312-E44F-4996-AA29-AFED53A90E8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E1B24C96-47DF-4FA2-8DF4-8241F4964F5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "A5067B83-AB9E-4819-B5A2-B14A96EB54C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "773B9BB2-0F65-4604-AF2C-8AC396DDC094", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "AA892169-0079-48D9-AEF5-641748CE1BF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A7E9A23-65D9-4C3D-BF2D-007D3428DE2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "C41815E9-08BC-49ED-9016-5FE804DCC779", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "7FA99146-7368-44B6-B7B4-3D77741E5A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "A0EF3852-4889-49F0-8D56-1E1FF1E811D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "D734AD8D-AE91-47C7-BD4D-467CFB63D163", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*", "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*", "matchCriteriaId": "CFAFF39D-126F-4984-A40B-88E94C680141", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*", "matchCriteriaId": "73EE725B-C26E-4343-B5F2-F5DF31A197C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*", "matchCriteriaId": "A26D9508-E43D-4BA2-9734-CDABBD405D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*", "matchCriteriaId": "01D11526-6DCD-4B73-BACC-FC619D92BBB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*", "matchCriteriaId": "24641D2D-BB95-4E26-AD96-8CE96B6B3976", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*", "matchCriteriaId": "A24A87F0-AE9A-46DB-8E47-7819E18513CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*", "matchCriteriaId": "13460979-98A3-4873-B9E4-86327F9C2B2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*", "matchCriteriaId": "DB91B1E2-12F5-4DE1-95D8-400196730902", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*", "matchCriteriaId": "3F3F3F1A-8EA5-4065-84F8-3DBC5E4A8F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.38:*:*:*:*:*:*:*", "matchCriteriaId": "3662B940-BE1F-4CB5-B341-2E3DE8954064", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads." }, { "lang": "es", "value": "Openswan v2.6.39 y anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero nulo y reinicio del demonio IKE) a trav\u00e9s de paquetes IKEv2 que cuenten con payloads esperados." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\n\n\"CWE-476: NULL Pointer Dereference\"", "id": "CVE-2013-6466", "lastModified": "2024-11-21T01:59:17.140", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-01-26T20:55:05.330", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-2893" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/65155" }, { "source": "secalert@redhat.com", "url": "https://cert.vde.com/en-us/advisories/vde-2017-001" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2893" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert.vde.com/en-us/advisories/vde-2017-001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
icsa-17-250-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "PHOENIX CONTACT", "summary": "reporting this vulnerability via CERT@VDE to ICS-CERT" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "ATTENTION: Remotely exploitable/low skill level to exploit.", "title": "Risk evaluation" }, { "category": "other", "text": "Communications, Critical Manufacturing, Information Technology", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability. This vulnerability is remotely exploitable.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-17-250-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2017/icsa-17-250-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-17-250-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-250-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-250-02" } ], "title": "PHOENIX CONTACT, Innominate Security Technologies mGuard Firmware", "tracking": { "current_release_date": "2017-09-07T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-17-250-02", "initial_release_date": "2017-09-07T00:00:00.000000Z", "revision_history": [ { "date": "2017-09-07T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-17-250-02 PHOENIX CONTACT Innominate Security Technologies mGuard Firmware" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "TC MGUARD RS2000 3G VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "TC MGUARD RS2000 3G VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "TC MGUARD RS4000 3G VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "TC MGUARD RS4000 3G VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD PCI4000: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "FL MGUARD PCI4000" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS2005 TX VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "FL MGUARD RS2005 TX VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD DELTA TX/TX: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "FL MGUARD DELTA TX/TX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS4004 TX/DTX: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "FL MGUARD RS4004 TX/DTX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "TC MGUARD RS2000 4G VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "TC MGUARD RS2000 4G VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD SMART2: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "FL MGUARD SMART2" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD PCI4000 VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "FL MGUARD PCI4000 VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS2000 TX/TX VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00010" } } ], "category": "product_name", "name": "FL MGUARD RS2000 TX/TX VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS4000 TX/TX VPN-M: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00011" } } ], "category": "product_name", "name": "FL MGUARD RS4000 TX/TX VPN-M" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS VPN ANALOG: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00012" } } ], "category": "product_name", "name": "FL MGUARD RS VPN ANALOG" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD PCIE4000 VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00013" } } ], "category": "product_name", "name": "FL MGUARD PCIE4000 VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS4000 TX/TX: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00014" } } ], "category": "product_name", "name": "FL MGUARD RS4000 TX/TX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD GT/GT VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00015" } } ], "category": "product_name", "name": "FL MGUARD GT/GT VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS4004 TX/DTX VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00016" } } ], "category": "product_name", "name": "FL MGUARD RS4004 TX/DTX VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS4000 TX/TX VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00017" } } ], "category": "product_name", "name": "FL MGUARD RS4000 TX/TX VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD GT/GT: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00018" } } ], "category": "product_name", "name": "FL MGUARD GT/GT" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS4000 TX/TX-P: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00019" } } ], "category": "product_name", "name": "FL MGUARD RS4000 TX/TX-P" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00020" } } ], "category": "product_name", "name": "FL MGUARD RS" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD DELTA TX/TX VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00021" } } ], "category": "product_name", "name": "FL MGUARD DELTA TX/TX VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD SMART2 VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00022" } } ], "category": "product_name", "name": "FL MGUARD SMART2 VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD CENTERPORT: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00023" } } ], "category": "product_name", "name": "FL MGUARD CENTERPORT" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "TC MGUARD RS4000 4G VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00024" } } ], "category": "product_name", "name": "TC MGUARD RS4000 4G VPN" } ], "category": "vendor", "name": "PHOENIX CONTACT, Innominate Security Technologies" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-6466", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "Openswan 2.6.39 and earlier, which is used in the mGuard firmware version 8.0.0 to 8.5.1, allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.CVE-2013-6466 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6466" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "PHOENIX CONTACT and Innominate Security Technologies recommend all users running mGuard devices with affected firmware versions to update to firmware Version 8.5.2 or higher, which fixes this vulnerability. Links to updates and additional information can be found in the CERT@VDE advisory at the following location:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024" ], "url": "https://cert.vde.com/de-de/advisories/vde-2017-001" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024" ] } ] } ] }
ICSA-17-250-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "PHOENIX CONTACT", "summary": "reporting this vulnerability via CERT@VDE to ICS-CERT" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "ATTENTION: Remotely exploitable/low skill level to exploit.", "title": "Risk evaluation" }, { "category": "other", "text": "Communications, Critical Manufacturing, Information Technology", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability. This vulnerability is remotely exploitable.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-17-250-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2017/icsa-17-250-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-17-250-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-250-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-250-02" } ], "title": "PHOENIX CONTACT, Innominate Security Technologies mGuard Firmware", "tracking": { "current_release_date": "2017-09-07T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-17-250-02", "initial_release_date": "2017-09-07T00:00:00.000000Z", "revision_history": [ { "date": "2017-09-07T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-17-250-02 PHOENIX CONTACT Innominate Security Technologies mGuard Firmware" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "TC MGUARD RS2000 3G VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "TC MGUARD RS2000 3G VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "TC MGUARD RS4000 3G VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "TC MGUARD RS4000 3G VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD PCI4000: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "FL MGUARD PCI4000" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS2005 TX VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "FL MGUARD RS2005 TX VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD DELTA TX/TX: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "FL MGUARD DELTA TX/TX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS4004 TX/DTX: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "FL MGUARD RS4004 TX/DTX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "TC MGUARD RS2000 4G VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "TC MGUARD RS2000 4G VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD SMART2: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "FL MGUARD SMART2" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD PCI4000 VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "FL MGUARD PCI4000 VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS2000 TX/TX VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00010" } } ], "category": "product_name", "name": "FL MGUARD RS2000 TX/TX VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS4000 TX/TX VPN-M: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00011" } } ], "category": "product_name", "name": "FL MGUARD RS4000 TX/TX VPN-M" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS VPN ANALOG: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00012" } } ], "category": "product_name", "name": "FL MGUARD RS VPN ANALOG" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD PCIE4000 VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00013" } } ], "category": "product_name", "name": "FL MGUARD PCIE4000 VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS4000 TX/TX: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00014" } } ], "category": "product_name", "name": "FL MGUARD RS4000 TX/TX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD GT/GT VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00015" } } ], "category": "product_name", "name": "FL MGUARD GT/GT VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS4004 TX/DTX VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00016" } } ], "category": "product_name", "name": "FL MGUARD RS4004 TX/DTX VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS4000 TX/TX VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00017" } } ], "category": "product_name", "name": "FL MGUARD RS4000 TX/TX VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD GT/GT: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00018" } } ], "category": "product_name", "name": "FL MGUARD GT/GT" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS4000 TX/TX-P: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00019" } } ], "category": "product_name", "name": "FL MGUARD RS4000 TX/TX-P" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD RS: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00020" } } ], "category": "product_name", "name": "FL MGUARD RS" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD DELTA TX/TX VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00021" } } ], "category": "product_name", "name": "FL MGUARD DELTA TX/TX VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD SMART2 VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00022" } } ], "category": "product_name", "name": "FL MGUARD SMART2 VPN" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "FL MGUARD CENTERPORT: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00023" } } ], "category": "product_name", "name": "FL MGUARD CENTERPORT" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 8.0.0 | \u003c= 8.5.1", "product": { "name": "TC MGUARD RS4000 4G VPN: firmware versions 8.0.0 to 8.5.1", "product_id": "CSAFPID-00024" } } ], "category": "product_name", "name": "TC MGUARD RS4000 4G VPN" } ], "category": "vendor", "name": "PHOENIX CONTACT, Innominate Security Technologies" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-6466", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "Openswan 2.6.39 and earlier, which is used in the mGuard firmware version 8.0.0 to 8.5.1, allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.CVE-2013-6466 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6466" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "PHOENIX CONTACT and Innominate Security Technologies recommend all users running mGuard devices with affected firmware versions to update to firmware Version 8.5.2 or higher, which fixes this vulnerability. Links to updates and additional information can be found in the CERT@VDE advisory at the following location:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024" ], "url": "https://cert.vde.com/de-de/advisories/vde-2017-001" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024" ] } ] } ] }
gsd-2013-6466
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2013-6466", "description": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.", "id": "GSD-2013-6466", "references": [ "https://www.suse.com/security/cve/CVE-2013-6466.html", "https://www.debian.org/security/2014/dsa-2893", "https://access.redhat.com/errata/RHSA-2014:0185", "https://advisories.mageia.org/CVE-2013-6466.html", "https://alas.aws.amazon.com/cve/html/CVE-2013-6466.html", "https://linux.oracle.com/cve/CVE-2013-6466.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-6466" ], "details": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.", "id": "GSD-2013-6466", "modified": "2023-12-13T01:22:18.942324Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6466", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.debian.org/security/2014/dsa-2893", "refsource": "MISC", "url": "http://www.debian.org/security/2014/dsa-2893" }, { "name": "http://rhn.redhat.com/errata/RHSA-2014-0185.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html" }, { "name": "http://www.securityfocus.com/bid/65155", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/65155" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2017-001", "refsource": "MISC", "url": "https://cert.vde.com/en-us/advisories/vde-2017-001" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524" }, { "name": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt", "refsource": "MISC", "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.39", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6466" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" }, { "name": "RHSA-2014:0185", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html" }, { "name": "DSA-2893", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2014/dsa-2893" }, { "name": "openswan-cve20136466-dos(90524)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524" }, { "name": "65155", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/65155" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2017-001", "refsource": "CONFIRM", "tags": [], "url": "https://cert.vde.com/en-us/advisories/vde-2017-001" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2019-07-29T14:24Z", "publishedDate": "2014-01-26T20:55Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.