Date: Thu, 31 May 2018 12:40:18 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 228631] security/strongswan: Update to 5.6.3 (Fixes DOS Security Vulnerabilities) Message-ID: <bug-228631-7788-SACEhrcjbA@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-228631-7788@https.bugs.freebsd.org/bugzilla/> References: <bug-228631-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D228631 --- Comment #2 from commit-hook@freebsd.org --- A commit references this bug: Author: krion Date: Thu May 31 12:39:52 UTC 2018 New revision: 471205 URL: https://svnweb.freebsd.org/changeset/ports/471205 Log: Update to 5.6.3 Fixes: - Denial-of-Service Vulnerability in the IKEv2 key derivation (CVE-2018-10811) - Denial-of-Service Vulnerability in the stroke plugin (CVE-2018-5388) - Crash on FreeBSD that was present in 5.6.2 - The kernel-pfkey plugin optionally installs routes via internal interface (one with an IP in the local traffic selector). On FreeBSD, enabling this selects the correct source IP when sending packets from the gateway itself. PR: 228631 Submitted by: maintainer Changes: head/security/strongswan/Makefile head/security/strongswan/distinfo =20 head/security/strongswan/files/patch-src_libcharon_sa_ikev2_authenticators_= pubkey_authenticator.c --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-228631-7788-SACEhrcjbA>