package/strongswan: security bump to version 5.9.4
- Fixed a denial-of-service vulnerability in the gmp plugin that was caused by an integer overflow when processing RSASSA-PSS signatures with very large salt lengths. This vulnerability has been registered as CVE-2021-41990. - Fixed a denial-of-service vulnerability in the in-memory certificate cache if certificates are replaced and a very large random value caused an integer overflow. This vulnerability has been registered as CVE-2021-41991. https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html https://github.com/strongswan/strongswan/blob/5.9.4/NEWS Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
This commit is contained in:
parent
b1fe3050f2
commit
c12e8a15f5
@ -1,7 +1,7 @@
|
||||
# From http://download.strongswan.org/strongswan-5.9.1.tar.bz2.md5
|
||||
md5 1f4db969d072e120dc12d1c116a0f658 strongswan-5.9.1.tar.bz2
|
||||
# From http://download.strongswan.org/strongswan-5.9.4.tar.bz2.md5
|
||||
md5 9c387eb77f0159fdefbcf7e81c905c35 strongswan-5.9.4.tar.bz2
|
||||
# Calculated based on the hash above
|
||||
sha256 a337c9fb63d973b8440827755c784031648bf423b7114a04918b0b00fd42cafb strongswan-5.9.1.tar.bz2
|
||||
sha256 45fdf1a4c2af086d8ff5b76fd7b21d3b6f0890f365f83bf4c9a75dda26887518 strongswan-5.9.4.tar.bz2
|
||||
# Locally calculated
|
||||
sha256 8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643 COPYING
|
||||
sha256 2292e21797754548dccdef9eef6aee7584e552fbd890fa914e1de8d3577d23f0 LICENSE
|
||||
|
@ -4,7 +4,7 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
STRONGSWAN_VERSION = 5.9.1
|
||||
STRONGSWAN_VERSION = 5.9.4
|
||||
STRONGSWAN_SOURCE = strongswan-$(STRONGSWAN_VERSION).tar.bz2
|
||||
STRONGSWAN_SITE = http://download.strongswan.org
|
||||
STRONGSWAN_LICENSE = GPL-2.0+
|
||||
|
Loading…
Reference in New Issue
Block a user