strongswan: security bump to version 5.3.2

Fixes:

CVE-2015-4171 - rogue servers with a valid certificate
accepted by the client to trick it into disclosing its username and even
password (if the client accepts EAP-GTC).

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
This commit is contained in:
Gustavo Zacarias 2015-06-08 10:50:06 -03:00 committed by Thomas Petazzoni
parent fb67b749ca
commit 2965f2e455
2 changed files with 3 additions and 3 deletions

View File

@ -1,2 +1,2 @@
# From http://download.strongswan.org/strongswan-5.3.1.tar.bz2.md5
md5 66f258901a3d6c271da1a0c7fb3e5013 strongswan-5.3.1.tar.bz2
# From http://download.strongswan.org/strongswan-5.3.2.tar.bz2.md5
md5 fab014be1477ef4ebf9a765e10f8802c strongswan-5.3.2.tar.bz2

View File

@ -4,7 +4,7 @@
#
################################################################################
STRONGSWAN_VERSION = 5.3.1
STRONGSWAN_VERSION = 5.3.2
STRONGSWAN_SOURCE = strongswan-$(STRONGSWAN_VERSION).tar.bz2
STRONGSWAN_SITE = http://download.strongswan.org
STRONGSWAN_LICENSE = GPLv2+