strongswan: security bump to version 5.3.2
Fixes: CVE-2015-4171 - rogue servers with a valid certificate accepted by the client to trick it into disclosing its username and even password (if the client accepts EAP-GTC). Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
This commit is contained in:
parent
fb67b749ca
commit
2965f2e455
@ -1,2 +1,2 @@
|
||||
# From http://download.strongswan.org/strongswan-5.3.1.tar.bz2.md5
|
||||
md5 66f258901a3d6c271da1a0c7fb3e5013 strongswan-5.3.1.tar.bz2
|
||||
# From http://download.strongswan.org/strongswan-5.3.2.tar.bz2.md5
|
||||
md5 fab014be1477ef4ebf9a765e10f8802c strongswan-5.3.2.tar.bz2
|
||||
|
@ -4,7 +4,7 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
STRONGSWAN_VERSION = 5.3.1
|
||||
STRONGSWAN_VERSION = 5.3.2
|
||||
STRONGSWAN_SOURCE = strongswan-$(STRONGSWAN_VERSION).tar.bz2
|
||||
STRONGSWAN_SITE = http://download.strongswan.org
|
||||
STRONGSWAN_LICENSE = GPLv2+
|
||||
|
Loading…
Reference in New Issue
Block a user