Back to strongswan PTS page

Accepted strongswan 5.5.1-4+deb9u2 (source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 04 Jun 2018 17:55:33 +0200
Source: strongswan
Binary: strongswan libstrongswan libstrongswan-standard-plugins libstrongswan-extra-plugins libcharon-extra-plugins strongswan-starter strongswan-libcharon strongswan-charon strongswan-ike strongswan-nm strongswan-ikev1 strongswan-ikev2 charon-cmd strongswan-pki strongswan-scepclient strongswan-swanctl charon-systemd
Architecture: source
Version: 5.5.1-4+deb9u2
Distribution: stretch-security
Urgency: medium
Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org>
Changed-By: Yves-Alexis Perez <corsac@debian.org>
Description:
 charon-cmd - standalone IPsec client
 charon-systemd - strongSwan IPsec client, systemd support
 libcharon-extra-plugins - strongSwan charon library (extra plugins)
 libstrongswan - strongSwan utility and crypto library
 libstrongswan-extra-plugins - strongSwan utility and crypto library (extra plugins)
 libstrongswan-standard-plugins - strongSwan utility and crypto library (standard plugins)
 strongswan - IPsec VPN solution metapackage
 strongswan-charon - strongSwan Internet Key Exchange daemon
 strongswan-ike - strongSwan Internet Key Exchange daemon (transitional package)
 strongswan-ikev1 - strongSwan IKEv1 daemon, transitional package
 strongswan-ikev2 - strongSwan IKEv2 daemon, transitional package
 strongswan-libcharon - strongSwan charon library
 strongswan-nm - strongSwan plugin to interact with NetworkManager
 strongswan-pki - strongSwan IPsec client, pki command
 strongswan-scepclient - strongSwan IPsec client, SCEP client
 strongswan-starter - strongSwan daemon starter and configuration file parser
 strongswan-swanctl - strongSwan IPsec client, swanctl command
Changes:
 strongswan (5.5.1-4+deb9u2) stretch-security; urgency=medium
 .
   * debian/patches:
     - CVE-2018-10811 added, fix missing initialization of a variable in IKEv2
     key derivation (CVE-2018-10811)
     - CVE-2018-5388 added, fix insufficient validation in the stroke plugin
     (CVE-2018-5388)
Checksums-Sha1:
 a2eb3c367a3f222203a063e63f4be493332cd3f6 3356 strongswan_5.5.1-4+deb9u2.dsc
 1b29a99323235b40cd80174c0a4e3fd7d7598941 129564 strongswan_5.5.1-4+deb9u2.debian.tar.xz
Checksums-Sha256:
 aa3560b1542431c76d232d756ac67cd741b32fad20b4a9f3220dcc3067c842b8 3356 strongswan_5.5.1-4+deb9u2.dsc
 c590c700fa4ebd134102a165cbfbefd70fc22656be738bb1a89c2fa43a31ab2e 129564 strongswan_5.5.1-4+deb9u2.debian.tar.xz
Files:
 1d241b97bb95a9b51f33f2bb156b4ec1 3356 net optional strongswan_5.5.1-4+deb9u2.dsc
 08c4a5f78a21e7d0803f77e97d104c4f 129564 net optional strongswan_5.5.1-4+deb9u2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlsVZCMACgkQ3rYcyPpX
RFu8pAgAkKuRFZ3jNoQvNYINkL0RCqmMa2kIJE94pgJW4aFaOnDt10TT1j1l8YCW
XmW0zgw1exq6MOnwWy6eIZxcBh2t/4bZ5hBqOxbMQtZD/2JMLzsZnEzhsB7OB0qQ
l5aUyGLf0eUlgfJXikJ2c583oaVg1qNs8ebNYd2BALM3oQ8fwZwDNZWn0OVN3wcq
GBUkxtaf3yoD8eGIvaHQbOcARCm55RiP7zrTHqIARTvLH4lPSVMo0VI/InHHlI9u
iTFQqMcbBuYVYCX+HuGtV4LwyLUtUZ5yAQx8zhfNxtY5uv0KD6ZwX1o0PGcHXYAE
QZ3h62dD+RkkY9IINp9bcGdqIu+k6Q==
=qR1+
-----END PGP SIGNATURE-----