strongswan
No description set
- Devel package for openSUSE:Factory
-
4
derived packages
- Developed at SCM
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout network:vpn/strongswan && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
0005-strongswan-5.2.2-5.3.0_unknown_payload.patch | 0000006047 5.91 KB | |
0006-strongswan-5.1.0-5.3.1_enforce_remote_auth.pa |
0000003032 2.96 KB | |
_link | 0000000232 232 Bytes | |
project.diff | 0000001712 1.67 KB |
Revision 93 (latest revision is 167)
Marius Tomaschewski (mtomaschewski)
committed
(revision 93)
- Applied upstream fix for a rogue servers vulnerability, that may enable rogue servers able to authenticate itself with certificate issued by any CA the client trusts, to gain user credentials from a client in certain IKEv2 setups (bsc#933591,CVE-2015-4171). [+ 0006-strongswan-5.1.0-5.3.1_enforce_remote_auth.patch] - Fix to apply unknown_payload patch if fips is disabled (<= 13.1) and renamed it to use number prefix corresponding with patch nr. [- strongswan-5.2.2-5.3.0_unknown_payload.patch, + 0005-strongswan-5.2.2-5.3.0_unknown_payload.patch]
Comments 0