Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 6 Jan 2014 06:40:01 GMT
From:      Dewayne Geraghty <dewayne.geraghty@heuristicsystems.com.au>
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   Re: ports/183688: [maintainer update] security/strongswan 5.0.4 -&gt;  5.1.1
Message-ID:  <201401060640.s066e1uk075469@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/183688; it has been noted by GNATS.

From: Dewayne Geraghty <dewayne.geraghty@heuristicsystems.com.au>
To: bug-followup@FreeBSD.org, strongswan@nanoteq.com
Cc: security-officer@FreeBSD.org
Subject: Re: ports/183688: [maintainer update] security/strongswan 5.0.4 -&gt;
 5.1.1
Date: Mon, 06 Jan 2014 17:30:39 +1100

 The patches discussed in Nov, 2013 should be committed to ports to
 address the DOS, user impersonation or access restriction bypass
 vulnerabilities, as soon as testing is complete.  Please refer to:
 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6075
 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6076
 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5018
 for details.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201401060640.s066e1uk075469>