Date: Mon, 16 Nov 2015 13:37:52 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 204597] security/strongswan: Update to 5.3.4 [CVE-2015-8023] Message-ID: <bug-204597-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=204597 Bug ID: 204597 Summary: security/strongswan: Update to 5.3.4 [CVE-2015-8023] Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: strongswan@Nanoteq.com Created attachment 163192 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=163192&action=edit Update security/strongSwan 5.3.3 to 5.3.4 Update security/strongSwan 5.3.3 to 5.3.4 - Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin that was caused by insufficient verification of the internal state when handling EAP-MSCHAPv2 Success messages received by the client. This vulnerability has been registered as CVE-2015-8023. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-204597-13>