diff options
author | Tobias Brunner <tobias@strongswan.org> | 2015-11-12 15:35:52 +0100 |
---|---|---|
committer | Andreas Steffen <andreas.steffen@strongswan.org> | 2015-11-16 13:19:36 +0100 |
commit | 453e204ac40dfff2e0978e8f84a5f8ff0cbc45e2 (patch) | |
tree | fd683eba35843d48c9a4f13926d47b9e2cf74ca9 | |
parent | f9c5c805532566572ec8b79a76d7e24bb44cee85 (diff) | |
download | strongswan-453e204ac40dfff2e0978e8f84a5f8ff0cbc45e2.tar.bz2 strongswan-453e204ac40dfff2e0978e8f84a5f8ff0cbc45e2.tar.xz |
NEWS: Add info about CVE-2015-8023
-rw-r--r-- | NEWS | 7 |
1 files changed, 6 insertions, 1 deletions
@@ -1,6 +1,11 @@ strongswan-5.3.4 ---------------- +- Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin that + was caused by insufficient verification of the internal state when handling + MSCHAPv2 Success messages received by the client. + This vulnerability has been registered as CVE-2015-8023. + - The sha3 plugin implements the SHA3 Keccak-F1600 hash algorithm family. Within the strongSwan framework SHA3 is currently used for BLISS signatures only because the OIDs for other signature algorithms haven't been defined @@ -46,7 +51,7 @@ strongswan-5.3.3 since 5.0.0) and packets that have the flag set incorrectly are again ignored. - Implemented a demo Hardcopy Device IMC/IMV pair based on the "Hardcopy - Device Health Assessment Trusted Network Connect Binding" (HCD-TNC) + Device Health Assessment Trusted Network Connect Binding" (HCD-TNC) document drafted by the IEEE Printer Working Group (PWG). - Fixed IF-M segmentation which failed in the presence of multiple small |