Révision f10fac17
Ajouté par Ermal il y a presque 10 ans
pfPorts/strongswan/files/patch-xauth_generic.c | ||
---|---|---|
140 | 140 |
- { |
141 | 141 |
+ /* XXX: Maybe support even FCGI calling here? */ |
142 | 142 |
+ service = lib->settings->get_str(lib->settings, |
143 |
+ "%s.plugins.xauth-generic.script", charon->name);
|
|
143 |
+ "%s.plugins.xauth-generic.script", NULL, lib->ns);
|
|
144 | 144 |
+ if (service) { |
145 | 145 |
+ authcfg = lib->settings->get_str(lib->settings, |
146 | 146 |
+ "%s.plugins.xauth-generic.authcfg", |
147 |
+ charon->name);
|
|
147 |
+ NULL, lib->ns);
|
|
148 | 148 |
+ if (!authenticate(service, user, pass, authcfg)) |
149 | 149 |
status = SUCCESS; |
150 | 150 |
- break; |
Formats disponibles : Unified diff
Upgrade to latest strongswan to avoid
CVE name CVE-2014-2338
http://portaudit.freebsd.org/6fb521b0-d388-11e3-a790-000c2980a9f3.html
URL: <http://www.strongswan.org/blog/2014/04/14/strongswan-authentication-bypass-vulnerability-%28cve-2014-2338%29.html>