Compare commits

...

10 Commits

Author SHA1 Message Date
openeuler-ci-bot
0ec3cc32ed
!83 [sync] PR-81: Update to 4.15 for fix CVE-2024-3652
From: @openeuler-sync-bot 
Reviewed-by: @wu-leilei 
Signed-off-by: @wu-leilei
2024-04-30 06:17:43 +00:00
wk333
b2dcfdff28 Update to 4.15 for fix CVE-2024-3652
(cherry picked from commit a7f6da2116e03096919b17222d3db4b5903c1e39)
2024-04-30 10:59:10 +08:00
openeuler-ci-bot
3759797b02
!70 [sync] PR-68: Upgrade to 4.14 for fix CVE-2024-2357
From: @openeuler-sync-bot 
Reviewed-by: @wu-leilei 
Signed-off-by: @wu-leilei
2024-03-12 07:54:09 +00:00
starlet-dx
99f9d5e8bd Upgrade to 4.14 for fix CVE-2024-2357
(cherry picked from commit 48f9ac2c82c07b69073a1302a9a09af26cccf987)
2024-03-12 11:01:09 +08:00
openeuler-ci-bot
6c18ffdf84
!63 [sync] PR-56: Update to 4.12 for CVE-2023-38710, CVE-2023-38711 and CVE-2023-38712
From: @openeuler-sync-bot 
Reviewed-by: @wu-leilei 
Signed-off-by: @wu-leilei
2023-08-14 09:29:13 +00:00
Funda Wang
4967620911 4.12
(cherry picked from commit 0dffdaf40c337d9a6c7dfd5c178d0213658b6fc8)
2023-08-14 16:07:58 +08:00
openeuler-ci-bot
0893fd97b6
!50 Update to 4.11 for fix CVE-2023-30570
From: @wk333 
Reviewed-by: @wu-leilei 
Signed-off-by: @wu-leilei
2023-05-31 06:31:33 +00:00
wk333
e3f4153dd7 Update to 4.11 for fix CVE-2023-30570 2023-05-31 10:59:51 +08:00
openeuler-ci-bot
104c9a7d81 !26 [sync] PR-23: fix algparse unknown option -d
From: @openeuler-sync-bot
Reviewed-by: @ruebb
Signed-off-by: @ruebb
2021-08-17 03:08:59 +00:00
caodongxia
6b20790e44 Fix algparse unknown option -d
(cherry picked from commit 9f54339fa790654616b4649916c6034786fd260f)
2021-08-13 14:08:04 +08:00
3 changed files with 28 additions and 5 deletions

Binary file not shown.

BIN
libreswan-4.15.tar.gz Normal file

Binary file not shown.

View File

@ -1,4 +1,4 @@
%global nss_version 3.44.0-8
%global nss_version 3.52
%global unbound_version 1.6.6
%global libreswan_config \\\
SHELL_BINARY=/usr/bin/sh \\\
@ -18,16 +18,16 @@
USE_LINUX_AUDIT=true \\\
USE_NM=true \\\
USE_SECCOMP=true \\\
USE_XAUTHPAM=true \\\
USE_AUTHPAM=true \\\
USE_NSS_KDF=true \\\
%{nil}
Name: libreswan
Summary: IKE implementation for IPsec with IKEv1 and IKEv2 support
Version: 4.1
Version: 4.15
Release: 1
License: GPLv2
License: GPL-2.0-only
Url: https://libreswan.org/
Source0: https://download.libreswan.org/%{name}-%{version}.tar.gz
Source1: https://download.libreswan.org/cavs/ikev1_dsa.fax.bz2
@ -35,6 +35,7 @@ Source2: https://download.libreswan.org/cavs/ikev1_psk.fax.bz2
Source3: https://download.libreswan.org/cavs/ikev2.fax.bz2
Source4: openeuler-libreswan-sysctl.conf
BuildRequires: audit-libs-devel
BuildRequires: bison
BuildRequires: curl-devel
@ -91,7 +92,7 @@ Summary: Help documents for libreswan
Man pages and other related help documents for libreswan.
%prep
%setup -q -n libreswan-%{version}%{?prever}
%autosetup -n libreswan-%{version}%{?prever} -p1
sed -i "s/-lfreebl //" mk/config.mk
@ -103,6 +104,9 @@ sed -i '/config setup/a\\t# Specifies a directory forNSS database files\n\tnssdi
sed -i '/ipsec --checknss/s/$/ --nssdir \/etc\/ipsec.d/' ./initsystems/systemd/ipsec.service.in
linux_variant=`sed -n -e 's/"//g' -e 's/^ID_LIKE=//p' -e 's/^ID=//p' /etc/os-release|tr '\n' ' ' && echo`
sed -i "s/filter fedora/filter fedora $linux_variant/" mk/defaults/linux.mk
%build
make %{?_smp_mflags} \
OPTIMIZE_CFLAGS="%{optflags}" \
@ -177,6 +181,7 @@ certutil -N -d sql:$tmpdir --empty-password
%attr(0644,root,root) %{_unitdir}/ipsec.service
%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/pam.d/pluto
%attr(0700,root,root) %dir %{_sharedstatedir}/ipsec/nss
%config(noreplace) %{_sysconfdir}/logrotate.d/libreswan
%{_sbindir}/ipsec
%{_libexecdir}/ipsec
@ -186,6 +191,24 @@ certutil -N -d sql:$tmpdir --empty-password
%attr(0644,root,root) %doc %{_mandir}/*/*
%changelog
* Tue Apr 30 2024 wangkai <13474090681@163.com> - 4.15-1
- Update to 4.15 for fix CVE-2024-3652
* Tue Mar 12 2024 yaoxin <yao_xin001@hoperun.com> - 4.14-1
- Upgrade to 4.14 for fix CVE-2024-2357
* Sat Aug 12 2023 Funda Wang <fundawang@yeah.net> - 4.12-1
- Update to 4.12 for CVE-2023-38710, CVE-2023-38711 and CVE-2023-38712
* Wed Jun 14 2023 yangbo <yangbo1@xfusion.com> - 4.11-2
- Fix '\n' of the linux_variant
* Tue May 30 2023 wangkai <13474090681@163.com> - 4.11-1
- Update to 4.11 for fix CVE-2023-30570
* Wed Aug 11 2021 caodongxia <caodongxia@huawei.com> - 4.1-2
- Fix algparse unknown option -d
* Fri Dec 04 2020 lingsheng <lingsheng@huawei.com> - 4.1-1
- Update to 4.1