Added security info on CVE-2013-6075 and CVE-2013-6076
This commit is contained in:
parent
643da9d2e6
commit
7b8fbd7402
9
NEWS
9
NEWS
|
@ -1,6 +1,15 @@
|
||||||
strongswan-5.1.1
|
strongswan-5.1.1
|
||||||
----------------
|
----------------
|
||||||
|
|
||||||
|
- Fixed a denial-of-service vulnerability and potential authorization bypass
|
||||||
|
triggered by a crafted ID_DER_ASN1_DN ID payload. The cause is an insufficient
|
||||||
|
length check when comparing such identities. The vulnerability has been
|
||||||
|
registered as CVE-2013-6075.
|
||||||
|
|
||||||
|
- Fixed a denial-of-service vulnerability triggered by a crafted IKEv1
|
||||||
|
fragmentation payload. The cause is a NULL pointer dereference. The
|
||||||
|
vulnerability has been registered as CVE-2013-6076.
|
||||||
|
|
||||||
- The lean stand-alone pt-tls-client can set up a RFC 6876 PT-TLS session
|
- The lean stand-alone pt-tls-client can set up a RFC 6876 PT-TLS session
|
||||||
with a strongSwan policy enforcement point which uses the tnc-pdp charon
|
with a strongSwan policy enforcement point which uses the tnc-pdp charon
|
||||||
plugin.
|
plugin.
|
||||||
|
|
Loading…
Reference in New Issue