strongswan

Direct Vulnerabilities

Known vulnerabilities in the strongswan package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2026-35334

<5.9.8-5+deb12u4
  • L
CVE-2026-35330

<5.9.8-5+deb12u4
  • L
CVE-2026-35328

<5.9.8-5+deb12u4
  • L
CVE-2026-35329

<5.9.8-5+deb12u4
  • L
CVE-2026-35333

<5.9.8-5+deb12u4
  • L
CVE-2026-35331

<5.9.8-5+deb12u4
  • L
CVE-2026-35332

<5.9.8-5+deb12u4
  • H
Integer Underflow

<5.9.8-5+deb12u3
  • L
Integer Underflow

<5.9.8-5+deb12u2
  • M
CVE-2022-4967

<5.9.6-1
  • C
Buffer Overflow

<5.9.8-5+deb12u1
  • C
Improper Certificate Validation

<5.9.8-4
  • H
Resource Exhaustion

<5.9.8-1
  • C
NULL Pointer Dereference

<5.9.5-1
  • H
Integer Overflow or Wraparound

<5.9.4-1
  • H
Integer Overflow or Wraparound

<5.9.4-1
  • L
Improper Validation of Integrity Check Value

<5.1.0-1
  • H
Out-of-Bounds

<5.7.1-1
  • H
Improper Verification of Cryptographic Signature

<5.7.0-1
  • H
Improper Verification of Cryptographic Signature

<5.7.0-1
  • L
Weak Password Requirements

*
  • H
Missing Initialization of Resource

<5.6.3-1
  • M
Out-of-bounds Write

<5.6.3-1
  • M
Improper Verification of Cryptographic Signature

<5.6.2-1
  • C
Improper Data Handling

<5.3.0-2
  • H
NULL Pointer Dereference

<5.6.0-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<5.5.1-4
  • H
Improper Input Validation

<5.5.1-4
  • M
Access Restriction Bypass

<5.3.3-3
  • L
Information Exposure

<5.3.1-1
  • M
Improper Data Handling

<5.2.1-5
  • M
CVE-2014-2891

<5.1.2-1
  • M
Improper Authentication

<5.1.2-4
  • M
CVE-2013-6076

<5.1.0-3
  • M
Out-of-Bounds

<5.1.0-3
  • M
Out-of-Bounds

<4.3.4-1
  • M
Improper Authentication

<4.6.4-7
  • H
Improper Authentication

<4.5.2-1.4
  • H
Arbitrary Code Injection

<4.4.1-1
  • M
Cryptographic Issues

<4.3.2-1.1
  • M
Improper Input Validation

<4.2.14-1.2
  • M
Resource Management Errors

<4.2.14-1.1
  • M
Resource Management Errors

<4.2.14-1.1
  • M
Improper Input Validation

<4.2.14-1
  • M
Resource Management Errors

<4.2.4-5