Created attachment 163192 [details] Update security/strongSwan 5.3.3 to 5.3.4 Update security/strongSwan 5.3.3 to 5.3.4 - Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin that was caused by insufficient verification of the internal state when handling EAP-MSCHAPv2 Success messages received by the client. This vulnerability has been registered as CVE-2015-8023.
Created attachment 163193 [details] Update for security/vuxml to add CVE-2015-8023
A commit references this bug: Author: garga Date: Mon Nov 16 14:08:26 UTC 2015 New revision: 401762 URL: https://svnweb.freebsd.org/changeset/ports/401762 Log: Update security/strongswan to 5.3.4 PR: 204597 Submitted by: strongswan@nanoteq.com (maintainer) MFH: 2015Q4 Security: CVE 2015-8023 Security: https://github.com/strongswan/strongswan/commit/453e204ac40dfff2e0978e8f84a5f8ff0cbc45e2 Sponsored by: Rubicon Communications (Netgate) Changes: head/security/strongswan/Makefile head/security/strongswan/distinfo head/security/strongswan/files/patch-backport-04f22cdabc.diff head/security/strongswan/files/patch-backport-dff2d05bb9.diff
A commit references this bug: Author: garga Date: Mon Nov 16 14:16:39 UTC 2015 New revision: 401763 URL: https://svnweb.freebsd.org/changeset/ports/401763 Log: MFH: r401762 Update security/strongswan to 5.3.4 PR: 204597 Submitted by: strongswan@nanoteq.com (maintainer) Security: CVE 2015-8023 Security: https://github.com/strongswan/strongswan/commit/453e204ac40dfff2e0978e8f84a5f8ff0cbc45e2 Sponsored by: Rubicon Communications (Netgate) Approved by: ports-secteam (feld) Changes: _U branches/2015Q4/ branches/2015Q4/security/strongswan/Makefile branches/2015Q4/security/strongswan/distinfo
Post-commit classification