Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package strongswan for openSUSE:Factory 
checked in at 2023-06-14 16:28:35
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/strongswan (Old)
 and      /work/SRC/openSUSE:Factory/.strongswan.new.15902 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "strongswan"

Wed Jun 14 16:28:35 2023 rev:90 rq:1092643 version:5.9.11

Changes:
--------
--- /work/SRC/openSUSE:Factory/strongswan/strongswan.changes    2023-04-07 
18:16:15.352521087 +0200
+++ /work/SRC/openSUSE:Factory/.strongswan.new.15902/strongswan.changes 
2023-06-14 16:28:42.062232793 +0200
@@ -1,0 +2,30 @@
+Mon Jun 12 15:54:53 UTC 2023 - Jan Engelhardt <[email protected]>
+
+- Remove pre-SLE15 build logic
+
+-------------------------------------------------------------------
+Mon Jun 12 15:22:09 UTC 2023 - Mohd Saquib <[email protected]>
+
+- Update to release 5.9.11
+  * A deadlock in the vici plugin has been fixed
+  * Per RFC 5280, CRLs now have to be signed by a certificate that
+    either encodes the cRLSign keyUsage bit (even if it is a CA
+    certificate), or is a CA certificate without a keyUsage
+    extension.
+  * Support for optional CA labels in EST server URIs was added to
+    the pki --est and pki --estca commands.
+  * The pkcs7 and openssl plugins now support CMS-style signatures
+    in PKCS#7 containers, which allows verifying RSA-PSS and ECDSA
+    signatures.
+  * Fixed a regression in the server implementation of EAP-TLS when
+    using TLS <=1.2.
+  * The EAP-TLS client does now enforce that the TLS handshake is
+    complete when using TLS <=1.2.
+  * On Linux, the kernel-libipsec plugin can now optionally handle
+    ESP packets without UDP encapsulation.
+  * The dhcp plugin uses an alternative method to determine the
+    source address when sending unicast DHCP requests.
+  * ECDSA and EdDSA public keys are supported by the ipseckey
+    plugin when parsing RFC 4025 IPSECKEY resource records.
+
+-------------------------------------------------------------------

Old:
----
  strongswan-5.9.10.tar.bz2
  strongswan-5.9.10.tar.bz2.sig

New:
----
  strongswan-5.9.11.tar.bz2
  strongswan-5.9.11.tar.bz2.sig

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ strongswan.spec ++++++
--- /var/tmp/diff_new_pack.svHZQR/_old  2023-06-14 16:28:42.938238176 +0200
+++ /var/tmp/diff_new_pack.svHZQR/_new  2023-06-14 16:28:42.938238176 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           strongswan
-Version:        5.9.10
+Version:        5.9.11
 Release:        0
 %define         upstream_version     %{version}
 %define         strongswan_docdir    %{_docdir}/%{name}
@@ -31,31 +31,19 @@
 %else
 %bcond_with     tests
 %endif
-%if 0%{suse_version} > 1310
 %bcond_without  fipscheck
-%else
-%bcond_with     fipscheck
-%endif
 %ifarch %{ix86} ppc64le
 %bcond_without  integrity
 %else
 %bcond_with     integrity
 %endif
-%if 0%{suse_version} > 1110
 %bcond_without  farp
 %bcond_without  afalg
 %bcond_without  mysql
 %bcond_without  sqlite
 %bcond_without  gcrypt
 %bcond_without  nm
-%else
-%bcond_with     farp
-%bcond_with     afalg
-%bcond_with     mysql
-%bcond_with     sqlite
-%bcond_with     gcrypt
-%bcond_with     nm
-%endif
+%bcond_without  systemd
 Summary:        IPsec-based VPN solution
 License:        GPL-2.0-or-later
 Group:          Productivity/Networking/Security

++++++ strongswan-5.9.10.tar.bz2 -> strongswan-5.9.11.tar.bz2 ++++++
++++ 18205 lines of diff (skipped)

Reply via email to