strongswan: Update to 5.3.1
authorMichael Tremer <michael.tremer@ipfire.org>
Thu, 4 Jun 2015 17:26:44 +0000 (19:26 +0200)
committerMichael Tremer <michael.tremer@ipfire.org>
Thu, 4 Jun 2015 17:26:44 +0000 (19:26 +0200)
commit41ed4795fe92b1b16c8d946baef3f807adc97a77
tree41c72bad66c233ea271157111340341b4557fadd
parentb2faf4f566b687052d40c8a2c37ed633ed643cb8
strongswan: Update to 5.3.1

Fixed a denial-of-service and potential remote code execution vulnerability
triggered by IKEv1/IKEv2 messages that contain payloads for the respective
other IKE version. Such payload are treated specially since 5.2.2 but because
they were still identified by their original payload type they were used as
such in some places causing invalid function pointer dereferences.
The vulnerability has been registered as CVE-2015-3991.

https://www.strongswan.org/blog/2015/06/01/strongswan-vulnerability-%28cve-2015-3991%29.html

The increased buffer size has been fixed in bug #943 upstream
  https://wiki.strongswan.org/issues/943
lfs/strongswan
src/patches/strongswan-5.3.0-stroke-Increase-stroke-buffer-size-to-8k.patch [deleted file]
src/patches/strongswan-5.3.1-build-timeattack.patch [new file with mode: 0644]