aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorTobias Brunner <tobias@strongswan.org>2015-11-12 15:35:52 +0100
committerAndreas Steffen <andreas.steffen@strongswan.org>2015-11-16 13:19:36 +0100
commit453e204ac40dfff2e0978e8f84a5f8ff0cbc45e2 (patch)
treefd683eba35843d48c9a4f13926d47b9e2cf74ca9
parentf9c5c805532566572ec8b79a76d7e24bb44cee85 (diff)
downloadstrongswan-453e204ac40dfff2e0978e8f84a5f8ff0cbc45e2.tar.bz2
strongswan-453e204ac40dfff2e0978e8f84a5f8ff0cbc45e2.tar.xz
NEWS: Add info about CVE-2015-8023
-rw-r--r--NEWS7
1 files changed, 6 insertions, 1 deletions
diff --git a/NEWS b/NEWS
index d2ff0ede0..4674e52e6 100644
--- a/NEWS
+++ b/NEWS
@@ -1,6 +1,11 @@
strongswan-5.3.4
----------------
+- Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin that
+ was caused by insufficient verification of the internal state when handling
+ MSCHAPv2 Success messages received by the client.
+ This vulnerability has been registered as CVE-2015-8023.
+
- The sha3 plugin implements the SHA3 Keccak-F1600 hash algorithm family.
Within the strongSwan framework SHA3 is currently used for BLISS signatures
only because the OIDs for other signature algorithms haven't been defined
@@ -46,7 +51,7 @@ strongswan-5.3.3
since 5.0.0) and packets that have the flag set incorrectly are again ignored.
- Implemented a demo Hardcopy Device IMC/IMV pair based on the "Hardcopy
- Device Health Assessment Trusted Network Connect Binding" (HCD-TNC)
+ Device Health Assessment Trusted Network Connect Binding" (HCD-TNC)
document drafted by the IEEE Printer Working Group (PWG).
- Fixed IF-M segmentation which failed in the presence of multiple small