Accepted strongswan 5.5.1-4 (source) into unstable
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 29 May 2017 21:52:41 +0200
Source: strongswan
Binary: strongswan libstrongswan libstrongswan-standard-plugins libstrongswan-extra-plugins libcharon-extra-plugins strongswan-starter strongswan-libcharon strongswan-charon strongswan-ike strongswan-nm strongswan-ikev1 strongswan-ikev2 charon-cmd strongswan-pki strongswan-scepclient strongswan-swanctl charon-systemd
Architecture: source
Version: 5.5.1-4
Distribution: unstable
Urgency: high
Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org>
Changed-By: Yves-Alexis Perez <corsac@debian.org>
Description:
charon-cmd - standalone IPsec client
charon-systemd - strongSwan IPsec client, systemd support
libcharon-extra-plugins - strongSwan charon library (extra plugins)
libstrongswan - strongSwan utility and crypto library
libstrongswan-extra-plugins - strongSwan utility and crypto library (extra plugins)
libstrongswan-standard-plugins - strongSwan utility and crypto library (standard plugins)
strongswan - IPsec VPN solution metapackage
strongswan-charon - strongSwan Internet Key Exchange daemon
strongswan-ike - strongSwan Internet Key Exchange daemon (transitional package)
strongswan-ikev1 - strongSwan IKEv1 daemon, transitional package
strongswan-ikev2 - strongSwan IKEv2 daemon, transitional package
strongswan-libcharon - strongSwan charon library
strongswan-nm - strongSwan plugin to interact with NetworkManager
strongswan-pki - strongSwan IPsec client, pki command
strongswan-scepclient - strongSwan IPsec client, SCEP client
strongswan-starter - strongSwan daemon starter and configuration file parser
strongswan-swanctl - strongSwan IPsec client, swanctl command
Changes:
strongswan (5.5.1-4) unstable; urgency=high
.
* Urgency=high for the security fix.
* debian/patches:
- CVE-2017-9022_insufficient_input_validation_gmp_plugin added, fix
insufficient input validation in gmp plugin which could lead to denial of
service (CVE-2017-9022).
- CVE-2017-9023_incorrect_handling_of_choice_types_in_asn1_parser added,
fix incorrect handling of CHOICE types in ASN.1 parser and x509 plugin
whch could lead to an infinite loop and a denial of service
(CVE-2017-9023).
Checksums-Sha1:
26e7f670dac91ea6993641015e761241bbb0c120 3328 strongswan_5.5.1-4.dsc
ae79faf9225ab08c54a8aca661c07b9971bdc47b 128192 strongswan_5.5.1-4.debian.tar.xz
136201323becb8bf6ef6862655669a76270e6bce 17538 strongswan_5.5.1-4_amd64.buildinfo
Checksums-Sha256:
6d5bb37f2e8cb832f2e2f989a6f8e468317dde67f3889130646c33ba5fbffe30 3328 strongswan_5.5.1-4.dsc
562bf084c9d0a5f45121b23ac455beb25fecb4a456ced381b834b2a1ef4b7099 128192 strongswan_5.5.1-4.debian.tar.xz
0f0f0d89536c345598bd07190ff01a6896c9d7ad62aa755a99d1b1919339cd55 17538 strongswan_5.5.1-4_amd64.buildinfo
Files:
31c94f6f8e4a3c23c4731d28ed7db7e5 3328 net optional strongswan_5.5.1-4.dsc
e52db100f7ece112934a839edeea7ac9 128192 net optional strongswan_5.5.1-4.debian.tar.xz
1a8ebed25f866660bca044e2447b2781 17538 net optional strongswan_5.5.1-4_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEEl0WwInMjgf6efq/1bdtT8qZ1wKUFAlktXmYACgkQbdtT8qZ1
wKVZPwf/fMAipHNKidke+3B7k7I0X7b6CFZ/cCrpfjzuvKhOK8y7skQvB7xLug51
nz6KucXyPYc9xDyLAMnz8QtTyiBTw4qbW068nArAeOrEmnO7r7AeBXqrsIEtDGcN
3+Ybb6CwRuJYDi2GIDq2H6XSRLzYnGeIzutd0gFrvF6kWBxq6r5uRkqFu/pICb6Q
QLbQU0NbsnBVspAQnpBxAD944YFM0rxEYfSabcfSZcQb+wXGVA+mHTPNpvb7A+MG
xOUgG02n9dO/11y2mM0/MbEIHwV37xIsxNg6/Vso4KfoRJY4bGXAF9R6AetznAI9
dGT6kdP/KgCEcRlf2hjffzEHCkAYcg==
=pygv
-----END PGP SIGNATURE-----