summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-11-26Merge tag 'upstream/5.3.5'Yves-Alexis Perez
Upstream version 5.3.5
2015-11-26Imported Upstream version 5.3.5Yves-Alexis Perez
2015-11-19upload to unstableYves-Alexis Perez
2015-11-18remove files removed from orig tarballYves-Alexis Perez
2015-11-18CVE-2015-8023_eap_mschapv2_state droppedYves-Alexis Perez
2015-11-180001-socket-dynamic-Refactor-setting-source-address-when- droppedYves-Alexis Perez
2015-11-180001-socket-default-Refactor-setting-source-address-when- droppedYves-Alexis Perez
2015-11-18Refresh 03_systemd-service.patchYves-Alexis Perez
* debian/patches: - 03_systemd-service refreshed for new upstream release.
2015-11-18New upstream release.Yves-Alexis Perez
2015-11-18Merge tag 'upstream/5.3.4'Yves-Alexis Perez
Upstream version 5.3.4
2015-11-18Imported Upstream version 5.3.4Yves-Alexis Perez
2015-11-18Imported Upstream version 5.3.4Yves-Alexis Perez
2015-11-16upload to unstableYves-Alexis Perez
2015-11-16Fix CVE-2015-8023Yves-Alexis Perez
* Set urgency=high for security fix. * debian/patches: - CVE-2015-8023_eap_mschapv2_state added, fix authentication bypass when using EAP MSCHAPv2.
2015-11-04uploadYves-Alexis Perez
2015-11-04Make dh_install override arch-dependentYves-Alexis Perez
* debian/rules: - make the dh_install override arch-dependent only since it only acts on arch:any packages.
2015-11-03upload to unstableYves-Alexis Perez
2015-11-03update changelog for the source address selection bugYves-Alexis Perez
2015-11-03Add source address selection patch for socket-dynamic pluginYves-Alexis Perez
The socket-dynamic plugin has the same issue as the socket-default one so even if few people use it, it's worth fixing there too
2015-11-03Update source address selection patch to latest versionYves-Alexis Perez
commit log has been updated to provide more meaningful comments
2015-11-03Add patch to fix IPv6 source adress selectionYves-Alexis Perez
0001-socket-default-Refactor-setting-source-address-when- added (taken from ab8337b in the socket-default-refactor branch), fix source address selection with IPv6
2015-11-03add bug closure for new upstream releaseYves-Alexis Perez
2015-11-03install new pki --dn manpage to ipsec-starter package.Yves-Alexis Perez
2015-11-03New upstream releaseYves-Alexis Perez
2015-11-03Imported Upstream version 5.3.3Yves-Alexis Perez
2015-10-22Imported Upstream version 5.3.3Yves-Alexis Perez
2015-07-10Enable the connmark pluginYves-Alexis Perez
2015-06-11upload to unstableYves-Alexis Perez
2015-06-08Remove patches included upstreamYves-Alexis Perez
* debian/patches: - 05_ivgen-allow-reusing-same-message-id-twice dropped, included upstream. - CVE-2015-4171_enforce_remote_auth dropped as well.
2015-06-08New upstream release.Yves-Alexis Perez
2015-06-08Imported Upstream version 5.3.2Yves-Alexis Perez
2015-06-08Merge tag 'upstream/5.3.2'Yves-Alexis Perez
Upstream version 5.3.2
2015-06-04upload to unstableYves-Alexis Perez
2015-06-04CVE-2015-4171_enforce_remote_auth added, fix potential leak of ↵Yves-Alexis Perez
authentication credential to rogue server when using PSK or EAP. This is CVE-2015-4171.
2015-06-0405_ivgen-allow-reusing-same-message-id-twice added, allow reusing the same ↵Yves-Alexis Perez
message ID twice in sequential IV gen. strongSwan issue #980.
2015-06-03update few files not correctly updated by import-origYves-Alexis Perez
2015-06-01remove strongswan-5.2.2-5.3.0_unknown_payload.patch, included upstreamYves-Alexis Perez
2015-06-01New upstream release.Yves-Alexis Perez
2015-06-01Merge tag 'upstream/5.3.1'Yves-Alexis Perez
Upstream version 5.3.1 Conflicts: src/libstrongswan/plugins/aesni/aesni_cbc.h
2015-06-01Imported Upstream version 5.3.1Yves-Alexis Perez
2015-06-01uploadYves-Alexis Perez
2015-05-23debian/strongswan-starter.lintian-overrides: add override for ↵Yves-Alexis Perez
command-with-path-in-maintainer-script since it's there to check for file existence.
2015-05-23fix spurious licenseYves-Alexis Perez
2015-05-23Fix CVE-2015-3991 (DoS / RCE)Yves-Alexis Perez
* debian/patches: - strongswan-5.2.2-5.3.0_unknown_payload added, fixes a DoS and potential remote code execution vulnerability (CVE-2015-3991).
2015-04-16Upload to experimentalYves-Alexis Perez
2015-04-15debian/copyright updated.Yves-Alexis Perez
2015-04-11don't install obsolete/removed stuffYves-Alexis Perez
* debian/strongswan-starter.install - don't install the _updown and _updown_espmark manpages anymore, they're gone. - also remove the _updown_espmark script, gone too.
2015-04-11CVE-2014-9221_modp_custom dropped, included upstream.Yves-Alexis Perez
2015-04-1102_chunk-endianness dropped, included upstream.Yves-Alexis Perez
2015-04-1101_fix-manpages refreshed for new upstream release.Yves-Alexis Perez