Date: Mon, 6 Jan 2014 06:40:01 GMT From: Dewayne Geraghty <dewayne.geraghty@heuristicsystems.com.au> To: freebsd-ports-bugs@FreeBSD.org Subject: Re: ports/183688: [maintainer update] security/strongswan 5.0.4 -> 5.1.1 Message-ID: <201401060640.s066e1uk075469@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/183688; it has been noted by GNATS. From: Dewayne Geraghty <dewayne.geraghty@heuristicsystems.com.au> To: bug-followup@FreeBSD.org, strongswan@nanoteq.com Cc: security-officer@FreeBSD.org Subject: Re: ports/183688: [maintainer update] security/strongswan 5.0.4 -> 5.1.1 Date: Mon, 06 Jan 2014 17:30:39 +1100 The patches discussed in Nov, 2013 should be committed to ports to address the DOS, user impersonation or access restriction bypass vulnerabilities, as soon as testing is complete. Please refer to: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6075 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6076 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5018 for details.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201401060640.s066e1uk075469>