[Bug 204597] security/strongswan: Update to 5.3.4 [CVE-2015-8023]
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Mon Nov 16 13:37:53 UTC 2015
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=204597
Bug ID: 204597
Summary: security/strongswan: Update to 5.3.4 [CVE-2015-8023]
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
Status: New
Severity: Affects Many People
Priority: ---
Component: Individual Port(s)
Assignee: freebsd-ports-bugs at FreeBSD.org
Reporter: strongswan at Nanoteq.com
Created attachment 163192
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=163192&action=edit
Update security/strongSwan 5.3.3 to 5.3.4
Update security/strongSwan 5.3.3 to 5.3.4
- Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin that
was caused by insufficient verification of the internal state when handling
EAP-MSCHAPv2 Success messages received by the client. This vulnerability has
been registered as CVE-2015-8023.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list