From owner-svn-ports-head@FreeBSD.ORG Mon Jan 27 21:08:46 2014
Return-Path:
Delivered-To: svn-ports-head@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id A57D9C19;
Mon, 27 Jan 2014 21:08:46 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 76D031129;
Mon, 27 Jan 2014 21:08:46 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id s0RL8kW7002930;
Mon, 27 Jan 2014 21:08:46 GMT (envelope-from decke@svn.freebsd.org)
Received: (from decke@localhost)
by svn.freebsd.org (8.14.7/8.14.7/Submit) id s0RL8k3B002929;
Mon, 27 Jan 2014 21:08:46 GMT (envelope-from decke@svn.freebsd.org)
Message-Id: <201401272108.s0RL8k3B002929@svn.freebsd.org>
From: Bernhard Froehlich
Date: Mon, 27 Jan 2014 21:08:46 +0000 (UTC)
To: ports-committers@freebsd.org, svn-ports-all@freebsd.org,
svn-ports-head@freebsd.org
Subject: svn commit: r341451 - head/security/vuxml
X-SVN-Group: ports-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-ports-head@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: SVN commit messages for the ports tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 27 Jan 2014 21:08:46 -0000
Author: decke
Date: Mon Jan 27 21:08:45 2014
New Revision: 341451
URL: http://svnweb.freebsd.org/changeset/ports/341451
QAT: https://qat.redports.org/buildarchive/r341451/
Log:
- Fix style for strongswan entry
Reported by: remko
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Mon Jan 27 20:52:51 2014 (r341450)
+++ head/security/vuxml/vuln.xml Mon Jan 27 21:08:45 2014 (r341451)
@@ -108,18 +108,18 @@ Note: Please add new entries to the beg
strongSwan Project reports:
A DoS vulnerability triggered by crafted IKEv1 fragmentation
- payloads was discovered in strongSwan's IKE daemon charon. All
- versions since 5.0.2 are affected.
+ payloads was discovered in strongSwan's IKE daemon charon. All
+ versions since 5.0.2 are affected.
A DoS vulnerability and potential authorization bypass triggered
- by a crafted ID_DER_ASN1_DN ID payload was discovered in strongSwan.
- All versions since 4.3.3 are affected.
+ by a crafted ID_DER_ASN1_DN ID payload was discovered in strongSwan.
+ All versions since 4.3.3 are affected.
A DoS vulnerability in strongSwan was discovered, which is
- triggered by XAuth usernames and EAP identities in versions
- 5.0.3 and 5.0.4.
+ triggered by XAuth usernames and EAP identities in versions
+ 5.0.3 and 5.0.4.