- Update to 5.9.10

This commit is contained in:
Paul Wouters
2023-03-02 10:24:58 -05:00
parent 33fb3b13a3
commit 0132cc5668
3 changed files with 9 additions and 4 deletions

2
.gitignore vendored
View File

@@ -13,3 +13,5 @@
/strongswan-5.9.8.tar.bz2.sig /strongswan-5.9.8.tar.bz2.sig
/strongswan-5.9.9.tar.bz2 /strongswan-5.9.9.tar.bz2
/strongswan-5.9.9.tar.bz2.sig /strongswan-5.9.9.tar.bz2.sig
/strongswan-5.9.10.tar.bz2
/strongswan-5.9.10.tar.bz2.sig

View File

@@ -1,2 +1,2 @@
SHA512 (strongswan-5.9.9.tar.bz2) = 7f5d94527193ce7716292f30db75303a0594169647e41e8c9530a7dedd914ad7fecf94885356738fd54d3781a066fa591c621d531923b20780b1fca76ad7bd46 SHA512 (strongswan-5.9.10.tar.bz2) = cf1d4a79ec02ac0502494ce6bfcab7399ddff151e2bc39bd4fbb9562bae7d0c66cf8d1e387b3c36a35e4387d597889fd7519e7bce07d3a7f764b1b73bd8a4667
SHA512 (strongswan-5.9.9.tar.bz2.sig) = b2aba6e7cf1add4cf1c891dbd77e658d338c80abb2a1c6efcf5a23c65ff71d6b63857daa6613fae21b4d23adc0ef0df9d6e245198cd799bdf5534da097050d0e SHA512 (strongswan-5.9.10.tar.bz2.sig) = 174c3582c50505d7f35638eb68f717fd16e426009dff135125a847635fea1184d81fb7e81e24e3539bda1faa3fa9b1a42b679a841521c82d8048523d6b972fd3

View File

@@ -15,8 +15,8 @@
%global forgeurl0 https://github.com/strongswan/strongswan %global forgeurl0 https://github.com/strongswan/strongswan
Name: strongswan Name: strongswan
Version: 5.9.9 Version: 5.9.10
Release: 3%{?dist} Release: 1%{?dist}
Summary: An OpenSource IPsec-based VPN and TNC solution Summary: An OpenSource IPsec-based VPN and TNC solution
License: GPLv2+ License: GPLv2+
URL: https://www.strongswan.org/ URL: https://www.strongswan.org/
@@ -420,6 +420,9 @@ install -D -m 0644 %{SOURCE3} %{buildroot}/%{_tmpfilesdir}/strongswan-starter.co
%endif %endif
%changelog %changelog
* Thu Mar 02 2023 Paul Wouters <paul.wouters@aiven.io - 5.9.10-1
- Update to 5.9.10
* Tue Feb 28 2023 Paul Wouters <paul.wouters@aiven.io - 5.9.9-3 * Tue Feb 28 2023 Paul Wouters <paul.wouters@aiven.io - 5.9.9-3
- Resolves: CVE-2023-26463 authorization bypass in TLS-based EAP methods - Resolves: CVE-2023-26463 authorization bypass in TLS-based EAP methods