| Summary: | security/strongswan: Update to 5.3.4 [CVE-2015-8023] | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | Ports & Packages | Reporter: | Francois ten Krooden <strongswan> | ||||||
| Component: | Individual Port(s) | Assignee: | Renato Botelho <garga> | ||||||
| Status: | Closed FIXED | ||||||||
| Severity: | Affects Many People | CC: | garga, ports-secteam | ||||||
| Priority: | --- | Keywords: | patch, security | ||||||
| Version: | Latest | Flags: | strongswan:
maintainer-feedback+
koobs: merge-quarterly+ |
||||||
| Hardware: | Any | ||||||||
| OS: | Any | ||||||||
| Attachments: |
|
||||||||
Created attachment 163193 [details]
Update for security/vuxml to add CVE-2015-8023
A commit references this bug: Author: garga Date: Mon Nov 16 14:08:26 UTC 2015 New revision: 401762 URL: https://svnweb.freebsd.org/changeset/ports/401762 Log: Update security/strongswan to 5.3.4 PR: 204597 Submitted by: strongswan@nanoteq.com (maintainer) MFH: 2015Q4 Security: CVE 2015-8023 Security: https://github.com/strongswan/strongswan/commit/453e204ac40dfff2e0978e8f84a5f8ff0cbc45e2 Sponsored by: Rubicon Communications (Netgate) Changes: head/security/strongswan/Makefile head/security/strongswan/distinfo head/security/strongswan/files/patch-backport-04f22cdabc.diff head/security/strongswan/files/patch-backport-dff2d05bb9.diff A commit references this bug: Author: garga Date: Mon Nov 16 14:16:39 UTC 2015 New revision: 401763 URL: https://svnweb.freebsd.org/changeset/ports/401763 Log: MFH: r401762 Update security/strongswan to 5.3.4 PR: 204597 Submitted by: strongswan@nanoteq.com (maintainer) Security: CVE 2015-8023 Security: https://github.com/strongswan/strongswan/commit/453e204ac40dfff2e0978e8f84a5f8ff0cbc45e2 Sponsored by: Rubicon Communications (Netgate) Approved by: ports-secteam (feld) Changes: _U branches/2015Q4/ branches/2015Q4/security/strongswan/Makefile branches/2015Q4/security/strongswan/distinfo Post-commit classification |
Created attachment 163192 [details] Update security/strongSwan 5.3.3 to 5.3.4 Update security/strongSwan 5.3.3 to 5.3.4 - Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin that was caused by insufficient verification of the internal state when handling EAP-MSCHAPv2 Success messages received by the client. This vulnerability has been registered as CVE-2015-8023.