Date: Wednesday, May 30, 2018 @ 20:10:22
  Author: shibumi
Revision: 333492

upgpkg: strongswan 5.6.3-1

Modified:
  strongswan/trunk/PKGBUILD

----------+
 PKGBUILD |   11 ++++-------
 1 file changed, 4 insertions(+), 7 deletions(-)

Modified: PKGBUILD
===================================================================
--- PKGBUILD    2018-05-30 19:47:06 UTC (rev 333491)
+++ PKGBUILD    2018-05-30 20:10:22 UTC (rev 333492)
@@ -10,8 +10,8 @@
 # Contributor: Thermi <noel [at] familie-kuntze dot com>
 
 pkgname=strongswan
-pkgver=5.6.2
-pkgrel=2
+pkgver=5.6.3
+pkgrel=1
 pkgdesc="open source IPsec implementation"
 url='http://www.strongswan.org'
 license=("GPL2")
@@ -43,15 +43,13 @@
 source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2";
     "https://download.strongswan.org/strongswan-${pkgver}.tar.bz2.sig";
     'configure_ac.patch'
-    'cve_2018_5388.patch'
     )
 
 validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77")
 
-sha512sums=('cf2d5cb6c45d991fe0ad8eed4ea8628f95a1871e9728ddf0985aa26e78d1e6da1c92c961772aafd3e55cfcfa84516204a15561389d373f78140f05607b248c52'
+sha512sums=('080402640952b1a08e95bfe9c7f33c6a7dd01ac401b5e7e2e78257c0f2bf0a4d6078141232ac62abfacef892c493f6824948b3165d54d72b4e436ed564fd2609'
             'SKIP'
-            
'0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74'
-            
'77cfce88de2cb72d69c93f80f607a2f95cfedac45b40c8e9d60e22df07f0a37a617797e0cfa1b6132eb7a748ec694b6621e0e1ee0e80300431efc1a516713fcf')
+            
'0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74')
 
 # We don't build libipsec because it would get loaded before kernel-netlink 
and netkey, which
 # would case processing to be handled in user space. Also, the plugin is 
experimental. If you need it,
@@ -59,7 +57,6 @@
 prepare() {
     cd "${srcdir}/${pkgname}-${pkgver}"
     patch -p1 -l < "${srcdir}/configure_ac.patch"
-    patch -p1 -l < "${srcdir}/cve_2018_5388.patch"
     autoreconf
 }
 

Reply via email to