Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package strongswan for openSUSE:Factory 
checked in at 2023-03-03 22:24:35
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/strongswan (Old)
 and      /work/SRC/openSUSE:Factory/.strongswan.new.31432 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "strongswan"

Fri Mar  3 22:24:35 2023 rev:88 rq:1068724 version:5.9.10

Changes:
--------
--- /work/SRC/openSUSE:Factory/strongswan/strongswan.changes    2023-01-04 
18:10:33.876533828 +0100
+++ /work/SRC/openSUSE:Factory/.strongswan.new.31432/strongswan.changes 
2023-03-03 22:24:44.914587696 +0100
@@ -1,0 +2,32 @@
+Thu Mar  2 13:34:37 UTC 2023 - Jan Engelhardt <jeng...@inai.de>
+
+- Update to release 5.9.10
+  * Fixed a vulnerability related to certificate verification in
+    TLS-based EAP methods that leads to an authentication bypass
+    followed by an expired pointer dereference that results in a
+    denial of service but possibly even remote code execution.
+    [CVE-2023-26463]
+  * Added support for full packet hardware offload for IPsec SAs
+    and policies, which has been introduced with the Linux 6.2
+    kernel, to the kernel-netlink plugin. Bypass policies for the
+    IKE ports are automatically offloaded to devices that support
+    this type of offloading.
+  * TLS-based EAP methods use the key derivation specified in
+    draft-ietf-emu-tls-eap-types when used with TLS 1.3.
+  * Routes via XFRM interfaces can now optionally be installed
+    automatically by enabling the
+    charon.plugins.kernel-netlink.install_routes_xfrmi option.
+- If connections are missing in `ipsec status`, check that
+  strongswan-starter.service (rather than strongswan.service)
+  is active.
+- Remove CVE-2023-26463_tls_auth_bypass_exp_pointer.patch
+
+-------------------------------------------------------------------
+Thu Mar  2 12:26:39 UTC 2023 - Mohd Saquib <mohd.saq...@suse.com>
+
+- Added patch to fix a vulnerability in incorrectly accepted
+  untrusted public key with incorrect refcount
+  (CVE-2023-26463 boo#1208608)
+  [+ CVE-2023-26463_tls_auth_bypass_exp_pointer.patch]
+
+-------------------------------------------------------------------

Old:
----
  strongswan-5.9.9.tar.bz2
  strongswan-5.9.9.tar.bz2.sig

New:
----
  strongswan-5.9.10.tar.bz2
  strongswan-5.9.10.tar.bz2.sig

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ strongswan.spec ++++++
--- /var/tmp/diff_new_pack.6tFhQg/_old  2023-03-03 22:24:45.722590765 +0100
+++ /var/tmp/diff_new_pack.6tFhQg/_new  2023-03-03 22:24:45.730590796 +0100
@@ -17,7 +17,7 @@
 
 
 Name:           strongswan
-Version:        5.9.9
+Version:        5.9.10
 Release:        0
 %define         upstream_version     %{version}
 %define         strongswan_docdir    %{_docdir}/%{name}

++++++ strongswan-5.9.9.tar.bz2 -> strongswan-5.9.10.tar.bz2 ++++++
++++ 12548 lines of diff (skipped)

Reply via email to