summaryrefslogtreecommitdiff
path: root/NEWS
diff options
context:
space:
mode:
authorYves-Alexis Perez <corsac@debian.org>2015-06-08 15:35:16 +0200
committerYves-Alexis Perez <corsac@debian.org>2015-06-08 15:35:16 +0200
commit9a189fe1f78ae3e134e6360a91524cbc57d3cf94 (patch)
tree12bcf7b40140b70c80e1fa7067efb30b34a317b6 /NEWS
parenta7311b2447272f7431ced71d4dfcddea0e1d22fe (diff)
parentb238cf34df3fe4476ae6b7012e7cb3e9769d4d51 (diff)
downloadvyos-strongswan-9a189fe1f78ae3e134e6360a91524cbc57d3cf94.tar.gz
vyos-strongswan-9a189fe1f78ae3e134e6360a91524cbc57d3cf94.zip
Merge tag 'upstream/5.3.2'
Upstream version 5.3.2
Diffstat (limited to 'NEWS')
-rw-r--r--NEWS10
1 files changed, 10 insertions, 0 deletions
diff --git a/NEWS b/NEWS
index b2e8cb2e6..e0cfb7e98 100644
--- a/NEWS
+++ b/NEWS
@@ -1,3 +1,13 @@
+strongswan-5.3.2
+----------------
+
+- Fixed a vulnerability that allowed rogue servers with a valid certificate
+ accepted by the client to trick it into disclosing its username and even
+ password (if the client accepts EAP-GTC). This was caused because constraints
+ against the responder's authentication were enforced too late.
+ This vulnerability has been registered as CVE-2015-4171.
+
+
strongswan-5.3.1
----------------