Todo #12934
closed
- Project changed from pfSense Docs to pfSense
- Subject changed from Upgrade strongSwan to 5.9.5 or latest non-release candidate (CVE-2021-45079) to Update strongSwan
- Category changed from VPN to IPsec
- Target version set to 2.7.0
- Plus Target Version set to 22.05
- Release Notes set to Default
That vulnerability is not relevant to pfSense. It affects EAP clients, and pfSense can only act as an EAP server.
Still needs updated, but it is not a security issue.
- Status changed from New to Feedback
The update is done in the ports tree. It's in CE snapshots now, will be in the next Plus snapshots shortly.
[2.7.0-DEVELOPMENT][root@pfSense.home.arpa]/root: pkg info -x swan
strongswan-5.9.5
Tested successfully on
22.05-DEVELOPMENT (amd64)
built on Wed Apr 06 16:45:59 UTC 2022
FreeBSD 12.3-STABLE
Output
[22.05-DEVELOPMENT][root@pfSense.home.arpa]/root: pkg info -x swan
strongswan-5.9.5
- Status changed from Feedback to Resolved
- Release Notes changed from Default to Force Exclusion
Also available in: Atom
PDF