Updated to 5.7.1

Resolves rhbz#1635872 CVE-2018-16152
Resolves rhbz#1635875 CVE-2018-16151
This commit is contained in:
Mikhail Zabaluev
2018-10-05 01:36:09 +03:00
parent bc2de6a760
commit 2271eb0481
3 changed files with 9 additions and 4 deletions

2
.gitignore vendored
View File

@@ -1 +1 @@
/strongswan-5.6.3.tar.bz2
/strongswan-5.7.1.tar.bz2

View File

@@ -1 +1 @@
SHA512 (strongswan-5.6.3.tar.bz2) = 080402640952b1a08e95bfe9c7f33c6a7dd01ac401b5e7e2e78257c0f2bf0a4d6078141232ac62abfacef892c493f6824948b3165d54d72b4e436ed564fd2609
SHA512 (strongswan-5.7.1.tar.bz2) = 43102814434bee7c27a5956be59099cc4ffb9bb5b0d6382ce4c6a80d1d82ed6639f698f5f5544b9ca563554a344638c953525b0e2d39bc6b71b19055c80e07fc

View File

@@ -2,8 +2,8 @@
#%%define prerelease dr1
Name: strongswan
Version: 5.6.3
Release: 3%{?dist}
Version: 5.7.1
Release: 1%{?dist}
Summary: An OpenSource IPsec-based VPN and TNC solution
License: GPLv2+
URL: http://www.strongswan.org/
@@ -265,6 +265,11 @@ done
%{_libexecdir}/strongswan/charon-nm
%changelog
* Thu Oct 04 2018 Mikhail Zabaluev <mikhail.zabaluev@gmail.com> - 5.7.1-1
- Updated to 5.7.1
- Resolves rhbz#1635872 CVE-2018-16152
- Resolves rhbz#1635875 CVE-2018-16151
* Thu Aug 23 2018 Mikhail Zabaluev <mikhail.zabaluev@gmail.com> - 5.6.3-3
- Add plugin bypass-lan, disabled by default
- Resolves rhbz#1554479 Update to strongswan-charon-nm fails