* Mon May 13 2013 Paul Wouters <pwouters@redhat.com> - 3.3-1

- Updated to 3.3, which resolves CVE-2013-2052
This commit is contained in:
Paul Wouters 2013-05-13 14:34:29 -04:00
parent 5f79f634af
commit 7f95d077e2
3 changed files with 11 additions and 7 deletions

1
.gitignore vendored
View File

@ -1 +1,2 @@
/libreswan-3.2.tar.gz /libreswan-3.2.tar.gz
/libreswan-3.3.tar.gz

View File

@ -16,7 +16,7 @@
Name: libreswan Name: libreswan
Summary: IPsec implementation with IKEv1 and IKEv2 keying protocols Summary: IPsec implementation with IKEv1 and IKEv2 keying protocols
Version: 3.2 Version: 3.3
Release: %{?prever:0.}1%{?prever:.%{prever}}%{?dist} Release: %{?prever:0.}1%{?prever:.%{prever}}%{?dist}
License: GPLv2 License: GPLv2
Url: https://www.libreswan.org/ Url: https://www.libreswan.org/
@ -62,11 +62,11 @@ BuildRequires: ElectricFence
Requires: nss-tools, nss-softokn Requires: nss-tools, nss-softokn
%description %description
Libreswan is a free implementation of IPsec & IKE for Linux. IPsec is Libreswan is a free implementation of IPsec & IKE for Linux. IPsec is
the Internet Protocol Security and uses strong cryptography to provide the Internet Protocol Security and uses strong cryptography to provide
both authentication and encryption services. These services allow you both authentication and encryption services. These services allow you
to build secure tunnels through untrusted networks. Everything passing to build secure tunnels through untrusted networks. Everything passing
through the untrusted net is encrypted by the ipsec gateway machine and through the untrusted net is encrypted by the ipsec gateway machine and
decrypted by the gateway at the other end of the tunnel. The resulting decrypted by the gateway at the other end of the tunnel. The resulting
tunnel is a virtual private network or VPN. tunnel is a virtual private network or VPN.
@ -140,7 +140,7 @@ FS=$(pwd)
rm -rf %{buildroot}/usr/share/doc/libreswan rm -rf %{buildroot}/usr/share/doc/libreswan
install -d -m 0755 %{buildroot}%{_localstatedir}/run/pluto install -d -m 0755 %{buildroot}%{_localstatedir}/run/pluto
# used when setting --perpeerlog without --perpeerlogbase # used when setting --perpeerlog without --perpeerlogbase
install -d -m 0700 %{buildroot}%{_localstatedir}/log/pluto/peer install -d -m 0700 %{buildroot}%{_localstatedir}/log/pluto/peer
install -d %{buildroot}%{_sbindir} install -d %{buildroot}%{_sbindir}
@ -151,7 +151,7 @@ mkdir -p %{buildroot}%{_libdir}/fipscheck
echo "include /etc/ipsec.d/*.secrets" > %{buildroot}%{_sysconfdir}/ipsec.secrets echo "include /etc/ipsec.d/*.secrets" > %{buildroot}%{_sysconfdir}/ipsec.secrets
rm -fr %{buildroot}/etc/rc.d/rc* rm -fr %{buildroot}/etc/rc.d/rc*
%files %files
%doc BUGS CHANGES COPYING CREDITS README LICENSE %doc BUGS CHANGES COPYING CREDITS README LICENSE
%doc docs/*.* %doc docs/*.*
%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ipsec.conf %attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ipsec.conf
@ -180,9 +180,12 @@ rm -fr %{buildroot}/etc/rc.d/rc*
%postun %postun
%systemd_postun_with_restart ipsec.service %systemd_postun_with_restart ipsec.service
%post %post
%systemd_post ipsec.service %systemd_post ipsec.service
%changelog %changelog
* Mon May 13 2013 Paul Wouters <pwouters@redhat.com> - 3.3-1
- Updated to 3.3, which resolves CVE-2013-2052
* Sat Apr 13 2013 Paul Wouters <pwouters@redhat.com> - 3.2-1 * Sat Apr 13 2013 Paul Wouters <pwouters@redhat.com> - 3.2-1
- Initial package for Fedora - Initial package for Fedora

View File

@ -1 +1 @@
9917acaa9b389adf75588cbeba7279fd libreswan-3.2.tar.gz a3e8562dfa1a7f4384e0e66a26acec52 libreswan-3.3.tar.gz