From: Tobias Brunner Date: Wed, 31 Jul 2013 13:28:15 +0000 (+0200) Subject: NEWS: Add info about CVE-2013-5018 X-Git-Tag: 5.1.0~1 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=3a938a6f854a414df1a6dd9d8ef5761300b4623e;p=thirdparty%2Fstrongswan.git NEWS: Add info about CVE-2013-5018 --- diff --git a/NEWS b/NEWS index 664e830bcc..fb0b4a2c81 100644 --- a/NEWS +++ b/NEWS @@ -1,6 +1,11 @@ strongswan-5.1.0 ---------------- +- Fixed a denial-of-service vulnerability triggered by specific XAuth usernames + and EAP identities (since 5.0.3), and PEM files (since 4.1.11). The crash + was caused by insufficient error handling in the is_asn1() function. + The vulnerability has been registered as CVE-2013-5018. + - The new charon-cmd command line IKE client can establish road warrior connections using IKEv1 or IKEv2 with different authentication profiles. It does not depend on any configuration files and can be configured using a @@ -36,7 +41,7 @@ strongswan-5.1.0 - IKEv2 can now negotiate transport mode and IPComp in NAT situations. -- IKEv2 exchange initiators now properly closes an established IKE or CHILD_SA +- IKEv2 exchange initiators now properly close an established IKE or CHILD_SA on error conditions using an additional exchange, keeping state in sync between peers.