strongswan: Security Advisory - strongswan - CVE-2014-2891
authorYue Tao <Yue.Tao@windriver.com>
Mon, 28 Jul 2014 08:17:05 +0000 (04:17 -0400)
committerPatrick Ohly <patrick.ohly@intel.com>
Fri, 9 Jan 2015 16:40:56 +0000 (08:40 -0800)
commitf384a1837bb3d4f5cdf154ba6e709bd91d391165
tree7971010b05f14b7a9b9c08558f7f9785f3bb10dd
parent45e2b10d3978558331a8831c2c6aa65155a979f1
strongswan: Security Advisory - strongswan - CVE-2014-2891

strongSwan before 5.1.2 allows remote attackers to cause a denial of
service (NULL pointer dereference and IKE daemon crash) via a crafted
ID_DER_ASN1_DN ID payload.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2891

(From meta-openembedded rev: 18bea207810b73828451a60f2d647c91f83d1883)

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Patrick Ohly <patrick.ohly@intel.com>
meta-openembedded/meta-networking/recipes-support/strongswan/files/strongswan-4.3.3-5.1.1_asn1_unwrap.patch [new file with mode: 0644]
meta-openembedded/meta-networking/recipes-support/strongswan/strongswan_5.1.1.bb