Created attachment 190795 [details] Update strongswan to 5.6.2 Update strongswan to 5.6.2 to fix vulnerability CVE-2018-6459. https://github.com/strongswan/strongswan/blob/master/NEWS Fixed a DoS vulnerability in the parser for PKCS#1 RSASSA-PSS signatures that was caused by insufficient input validation. One of the configurable parameters in algorithm identifier structures for RSASSA-PSS signatures is the mask generation function (MGF). Only MGF1 is currently specified for this purpose. However, this in turn takes itself a parameter that specifies the underlying hash function. strongSwan's parser did not correctly handle the case of this parameter being absent, causing an undefined data read. This vulnerability has been registered as CVE-2018-6459. Bug 220488 is also fixed as part of this patch. (https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=220488)
Created attachment 190796 [details] Update vulnerability database.
Please, would you include this small change #220488?
bug #220488.
A commit references this bug: Author: garga Date: Thu Mar 1 13:49:00 UTC 2018 New revision: 463322 URL: https://svnweb.freebsd.org/changeset/ports/463322 Log: Document strongswan vulnerability PR: 226043 Submitted by: strongswan@Nanoteq.com Security: CVE-2018-6459 Sponsored by: Rubicon Communications, LLC (Netgate) Changes: head/security/vuxml/vuln.xml
A commit references this bug: Author: garga Date: Thu Mar 1 13:53:16 UTC 2018 New revision: 463323 URL: https://svnweb.freebsd.org/changeset/ports/463323 Log: - Update security/strongswan to 5.6.2 [1] - Enable CURL option by default [2] PR: 226043 [1], 220488 [2] Submitted by: strongswan@Nanoteq.com (maintainer) [1] karl@denninger.net [2] Approved by: maintainer [2] MFH: 2018Q1 Security: CVE-2018-6459 Sponsored by: Rubicon Communications, LLC (Netgate) Changes: head/security/strongswan/Makefile head/security/strongswan/distinfo head/security/strongswan/pkg-plist
A commit references this bug: Author: garga Date: Mon Mar 5 11:39:16 UTC 2018 New revision: 463645 URL: https://svnweb.freebsd.org/changeset/ports/463645 Log: MFH: r463323 - Update security/strongswan to 5.6.2 [1] - Enable CURL option by default [2] PR: 226043 [1], 220488 [2] Submitted by: strongswan@Nanoteq.com (maintainer) [1] karl@denninger.net [2] Approved by: maintainer [2] Security: CVE-2018-6459 Sponsored by: Rubicon Communications, LLC (Netgate) Approved by: ports-secteam (riggs) Changes: _U branches/2018Q1/ branches/2018Q1/security/strongswan/Makefile branches/2018Q1/security/strongswan/distinfo branches/2018Q1/security/strongswan/pkg-plist