package/strongswan: security bump to version 5.9.11

Fix CVE-2023-26463: strongSwan 5.9.8 and 5.9.9 potentially allows remote
code execution because it uses a variable named "public" for two
different purposes within the same function. There is initially
incorrect access control, later followed by an expired pointer
dereference. One attack vector is sending an untrusted client
certificate during EAP-TLS. A server is affected only if it loads
plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS,
EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.

https://github.com/strongswan/strongswan/blob/5.9.11/NEWS
https://www.strongswan.org/blog/2023/03/02/strongswan-vulnerability-(cve-2023-26463).html

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
This commit is contained in:
Fabrice Fontaine 2023-09-17 14:06:13 +02:00 committed by Yann E. MORIN
parent 8fc24fbd17
commit 78959665b9
2 changed files with 4 additions and 4 deletions

View File

@ -1,7 +1,7 @@
# From http://download.strongswan.org/strongswan-5.9.8.tar.bz2.md5
md5 f46b0d3e7aed88824650d0721c887443 strongswan-5.9.8.tar.bz2
# From http://download.strongswan.org/strongswan-5.9.11.tar.bz2.md5
md5 673e194cd256af77b46928179f2c81ad strongswan-5.9.11.tar.bz2
# Calculated based on the hash above
sha256 d3303a43c0bd7b75a12b64855e8edcb53696f06190364f26d1533bde1f2e453c strongswan-5.9.8.tar.bz2
sha256 ddf53f1f26ad26979d5f55e8da95bd389552f5de3682e35593f9a70b2584ed2d strongswan-5.9.11.tar.bz2
# Locally calculated
sha256 8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643 COPYING
sha256 2292e21797754548dccdef9eef6aee7584e552fbd890fa914e1de8d3577d23f0 LICENSE

View File

@ -4,7 +4,7 @@
#
################################################################################
STRONGSWAN_VERSION = 5.9.8
STRONGSWAN_VERSION = 5.9.11
STRONGSWAN_SOURCE = strongswan-$(STRONGSWAN_VERSION).tar.bz2
STRONGSWAN_SITE = http://download.strongswan.org
STRONGSWAN_LICENSE = GPL-2.0+