Commit Graph

8 Commits

Author SHA1 Message Date
Khem Raj
5b805b4597 strongswan: Include stdint.h for uintptr_t
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2017-09-08 16:38:07 -04:00
Oleksandr Kravchuk
c0e27d549e strongswan: delete obsolete patches
Signed-off-by: Oleksandr Kravchuk <oleksandr.kravchuk@pelagicore.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2017-01-19 09:25:44 +01:00
Chris Patterson
1dbb1ff9b1 strongswan: install strongswan-swanctl systemd service by default.
Matches start-on-boot behaviour of current strongswan.service.

Signed-off-by: Chris Patterson <pattersonc@ainfosec.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2016-01-05 12:43:33 -05:00
Chris Patterson
7d46b08775 strongswan: add configure patch fix for systemd
Fixes strongswan configure script for systemd >= 209,
where it merged libsystemd-journal and libsystemd-daemon
into libsystemd.

Signed-off-by: Chris Patterson <pattersonc@ainfosec.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2016-01-05 12:43:33 -05:00
Jackie Huang
778ddba701 strongswan: uprev to version 5.2.0
* removed two patches which were already integrated in 5.2.0:
  strongswan-4.3.3-5.1.1_asn1_unwrap.patch
  strongswan-5.0.0-5.1.2_reject_child_sa.patch

Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-08-21 21:35:07 +02:00
Yue Tao
18bea20781 strongswan: Security Advisory - strongswan - CVE-2014-2891
strongSwan before 5.1.2 allows remote attackers to cause a denial of
service (NULL pointer dereference and IKE daemon crash) via a crafted
ID_DER_ASN1_DN ID payload.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2891

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-08-05 16:23:58 -04:00
Yue Tao
6938319b32 strongswan: Security Advisory - strongswan - CVE-2014-2338
IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass
authentication by rekeying an IKE_SA during (1) initiation or (2)
re-authentication, which triggers the IKE_SA state to be set to
established.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2338

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Roy Li <rongqing.li@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2014-05-09 10:18:40 -04:00
Jackie Huang
238093bf8c strongswan: update verion to 5.1.1
* Add a patch to fix the function parameter.
* Add PACKAGECONFIG for optional packages instead of explicitly
  disable, and set sqlite and curl as default.
* Remove the split package strongswan-plugins.
* Add configure option --without-lib-prefix so it doesn't
  search for libraries in includedir and libdir to avoid QA error.

Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2014-03-14 08:51:45 -04:00