瀏覽代碼

strongswan: security bump to version 5.3.2

Fixes:

CVE-2015-4171 - rogue servers with a valid certificate
accepted by the client to trick it into disclosing its username and even
password (if the client accepts EAP-GTC).

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
Gustavo Zacarias 10 年之前
父節點
當前提交
2965f2e455
共有 2 個文件被更改,包括 3 次插入3 次删除
  1. 2 2
      package/strongswan/strongswan.hash
  2. 1 1
      package/strongswan/strongswan.mk

+ 2 - 2
package/strongswan/strongswan.hash

@@ -1,2 +1,2 @@
-# From http://download.strongswan.org/strongswan-5.3.1.tar.bz2.md5
-md5	66f258901a3d6c271da1a0c7fb3e5013	strongswan-5.3.1.tar.bz2
+# From http://download.strongswan.org/strongswan-5.3.2.tar.bz2.md5
+md5	fab014be1477ef4ebf9a765e10f8802c	strongswan-5.3.2.tar.bz2

+ 1 - 1
package/strongswan/strongswan.mk

@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-STRONGSWAN_VERSION = 5.3.1
+STRONGSWAN_VERSION = 5.3.2
 STRONGSWAN_SOURCE = strongswan-$(STRONGSWAN_VERSION).tar.bz2
 STRONGSWAN_SITE = http://download.strongswan.org
 STRONGSWAN_LICENSE = GPLv2+