mirror of
https://git.FreeBSD.org/ports.git
synced 2024-11-20 00:21:35 +00:00
Update to 5.6.3
Fixes: - Denial-of-Service Vulnerability in the IKEv2 key derivation (CVE-2018-10811) - Denial-of-Service Vulnerability in the stroke plugin (CVE-2018-5388) - Crash on FreeBSD that was present in 5.6.2 - The kernel-pfkey plugin optionally installs routes via internal interface (one with an IP in the local traffic selector). On FreeBSD, enabling this selects the correct source IP when sending packets from the gateway itself. PR: 228631 Submitted by: maintainer
This commit is contained in:
parent
6d978f3fe7
commit
9ccf25ffb8
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=471205
@ -2,8 +2,7 @@
|
|||||||
# $FreeBSD$
|
# $FreeBSD$
|
||||||
|
|
||||||
PORTNAME= strongswan
|
PORTNAME= strongswan
|
||||||
PORTVERSION= 5.6.2
|
PORTVERSION= 5.6.3
|
||||||
PORTREVISION= 1
|
|
||||||
CATEGORIES= security
|
CATEGORIES= security
|
||||||
MASTER_SITES= http://download.strongswan.org/ \
|
MASTER_SITES= http://download.strongswan.org/ \
|
||||||
http://download2.strongswan.org/
|
http://download2.strongswan.org/
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
TIMESTAMP = 1519043301
|
TIMESTAMP = 1527575366
|
||||||
SHA256 (strongswan-5.6.2.tar.bz2) = e0a60a30ebf3c534c223559e1686497a21ded709a5d605c5123c2f52bcc22e92
|
SHA256 (strongswan-5.6.3.tar.bz2) = c3c7dc8201f40625bba92ffd32eb602a8909210d8b3fac4d214c737ce079bf24
|
||||||
SIZE (strongswan-5.6.2.tar.bz2) = 4977859
|
SIZE (strongswan-5.6.3.tar.bz2) = 4961579
|
||||||
|
@ -1,22 +0,0 @@
|
|||||||
--- src/libcharon/sa/ikev2/authenticators/pubkey_authenticator.c.orig
|
|
||||||
+++ src/libcharon/sa/ikev2/authenticators/pubkey_authenticator.c
|
|
||||||
@@ -164,7 +164,7 @@ static array_t *select_signature_schemes(keymat_v2_t *keymat,
|
|
||||||
signature_scheme_t schemes[] = {
|
|
||||||
SIGN_RSA_EMSA_PKCS1_SHA2_384,
|
|
||||||
SIGN_RSA_EMSA_PKCS1_SHA2_256,
|
|
||||||
- }, contained;
|
|
||||||
+ };
|
|
||||||
bool found;
|
|
||||||
int i, j;
|
|
||||||
|
|
||||||
@@ -174,8 +174,8 @@ static array_t *select_signature_schemes(keymat_v2_t *keymat,
|
|
||||||
found = FALSE;
|
|
||||||
for (j = 0; j < array_count(selected); j++)
|
|
||||||
{
|
|
||||||
- array_get(selected, j, &contained);
|
|
||||||
- if (scheme == contained)
|
|
||||||
+ array_get(selected, j, &config);
|
|
||||||
+ if (scheme == config->scheme)
|
|
||||||
{
|
|
||||||
found = TRUE;
|
|
||||||
break;
|
|
Loading…
Reference in New Issue
Block a user