From owner-svn-ports-head@FreeBSD.ORG Mon Jan 27 21:27:40 2014
Return-Path:
Delivered-To: svn-ports-head@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id F0A396FD;
Mon, 27 Jan 2014 21:27:39 +0000 (UTC)
Received: from mail.jr-hosting.nl (mail.jr-hosting.nl [78.47.69.234])
by mx1.freebsd.org (Postfix) with ESMTP id 8C05512C8;
Mon, 27 Jan 2014 21:27:39 +0000 (UTC)
Received: from [10.0.2.17] (a44084.upc-a.chello.nl [62.163.44.84])
by mail.jr-hosting.nl (Postfix) with ESMTPSA id 8E3513F643;
Mon, 27 Jan 2014 22:27:37 +0100 (CET)
Content-Type: multipart/signed;
boundary="Apple-Mail=_5115A8DA-5D61-43BF-8FFA-455C35512B39";
protocol="application/pgp-signature"; micalg=pgp-sha1
Mime-Version: 1.0 (Mac OS X Mail 7.1 \(1827\))
Subject: Re: svn commit: r341451 - head/security/vuxml
From: Remko Lodder
In-Reply-To: <201401272108.s0RL8k3B002929@svn.freebsd.org>
Date: Mon, 27 Jan 2014 22:27:35 +0100
Message-Id:
References: <201401272108.s0RL8k3B002929@svn.freebsd.org>
To: Bernhard Froehlich
X-Mailer: Apple Mail (2.1827)
Cc: svn-ports-head@freebsd.org, svn-ports-all@freebsd.org,
ports-committers@freebsd.org
X-BeenThere: svn-ports-head@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: SVN commit messages for the ports tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 27 Jan 2014 21:27:40 -0000
--Apple-Mail=_5115A8DA-5D61-43BF-8FFA-455C35512B39
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
charset=us-ascii
On 27 Jan 2014, at 22:08, Bernhard Froehlich wrote:
> Author: decke
> Date: Mon Jan 27 21:08:45 2014
> New Revision: 341451
> URL: http://svnweb.freebsd.org/changeset/ports/341451
> QAT: https://qat.redports.org/buildarchive/r341451/
>=20
> Log:
> - Fix style for strongswan entry
>=20
> Reported by: remko
Thank you!! :)
>=20
> Modified:
> head/security/vuxml/vuln.xml
>=20
> Modified: head/security/vuxml/vuln.xml
> =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D
> --- head/security/vuxml/vuln.xml Mon Jan 27 20:52:51 2014 =
(r341450)
> +++ head/security/vuxml/vuln.xml Mon Jan 27 21:08:45 2014 =
(r341451)
> @@ -108,18 +108,18 @@ Note: Please add new entries to the beg
> strongSwan Project reports:
>
> A DoS vulnerability triggered by crafted IKEv1 =
fragmentation
> - payloads was discovered in strongSwan's IKE daemon charon. =
All
> - versions since 5.0.2 are affected.
> + payloads was discovered in strongSwan's IKE daemon charon. =
All
> + versions since 5.0.2 are affected.
>
>
> A DoS vulnerability and potential authorization bypass =
triggered
> - by a crafted ID_DER_ASN1_DN ID payload was discovered in =
strongSwan.
> - All versions since 4.3.3 are affected.
> + by a crafted ID_DER_ASN1_DN ID payload was discovered in =
strongSwan.
> + All versions since 4.3.3 are affected.
>
>
> A DoS vulnerability in strongSwan was discovered, which is
> - triggered by XAuth usernames and EAP identities in versions
> - 5.0.3 and 5.0.4.
> + triggered by XAuth usernames and EAP identities in versions
> + 5.0.3 and 5.0.4.
>
>