forked from pool/strongswan
- Applied upstream fix for a authentication bypass vulnerability
in the eap-mschapv2 plugin (CVE-2015-8023,bsc#953817). [+ 0007-strongswan-4.4.0-5.3.3_eap_mschapv2_state.patch] OBS-URL: https://build.opensuse.org/package/show/network:vpn/strongswan?expand=0&rev=95
This commit is contained in:
@@ -84,6 +84,7 @@ Patch4: %{name}_fipsfilter.patch
|
||||
%endif
|
||||
Patch5: 0005-strongswan-5.2.2-5.3.0_unknown_payload.patch
|
||||
Patch6: 0006-strongswan-5.1.0-5.3.1_enforce_remote_auth.patch
|
||||
Patch7: 0007-strongswan-4.4.0-5.3.3_eap_mschapv2_state.patch
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||
BuildRequires: bison
|
||||
BuildRequires: curl-devel
|
||||
@@ -296,6 +297,7 @@ and the load testing plugin for IKEv2 daemon.
|
||||
%endif
|
||||
%patch5 -p1
|
||||
%patch6 -p1
|
||||
%patch7 -p1
|
||||
sed -e 's|@libexecdir@|%_libexecdir|g' \
|
||||
< $RPM_SOURCE_DIR/strongswan.init.in \
|
||||
> strongswan.init
|
||||
|
Reference in New Issue
Block a user