Package: strongswan / 6.0.1-6+deb13u2
Metadata
| Package | Version | Patches format |
|---|---|---|
| strongswan | 6.0.1-6+deb13u2 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| 02_disable bypass lan.patch | (download) |
conf/plugins/bypass-lan.conf |
2 1 + 1 - 0 ! |
don't load bypass-lan plugin by default |
| 03_systemd service.patch | (download) |
init/systemd-starter/strongswan-starter.service.in |
5 3 + 2 - 0 ! |
tune the ipsec systemd service file - add a reload argument - don't wait on syslog |
| 04_disable libtls tests.patch | (download) |
src/libtls/Makefile.am |
2 1 + 1 - 0 ! |
disable libtls tests They're too intensive for the buildd network and cause FTBFS |
| dont load kernel libipsec plugin by default.patch | (download) |
conf/plugins/kernel-libipsec.conf |
2 1 + 1 - 0 ! |
dont-load-kernel-libipsec-plugin-by-default |
| 0001 openssl Fix testing KDF_PRF in the constructor with .patch | (download) |
src/libstrongswan/plugins/openssl/openssl_kdf.c |
8 8 + 0 - 0 ! |
[patch] openssl: fix testing kdf_prf in the constructor with openssl 3.5.1 Setting the salt to NULL now fails, so we set it to hash length's zeroes, which is the default value for HKDF-Extract if no salt is passed. Fixes strongswan/strongswan#2828 |
| 0002 openssl Don t allocate salt if PRF hash is unknown.patch | (download) |
src/libstrongswan/plugins/openssl/openssl_kdf.c |
2 1 + 1 - 0 ! |
[patch] openssl: don't allocate salt if prf/hash is unknown
This can happen if e.g. AES-XCBC is selected.
Fixes: 2dbeecfc029b ("openssl: Fix testing KDF_PRF in the constructor with OpenSSL 3.5.1")
|
| 0007 eap mschapv2 Fix length check for Failure Request pa.patch | (download) |
src/libcharon/plugins/eap_mschapv2/eap_mschapv2.c |
2 1 + 1 - 0 ! |
eap-mschapv2: fix length check for failure request packets on the client For message lengths between 6 and 8, subtracting HEADER_LEN (9) causes `message_len` to become negative, which is then used in calls to malloc() and memcpy() that both take size_t arguments, causing an integer underflow. For 6 and 7, the huge size requested from malloc() will fail (it exceeds |
