[ubuntu/jammy-proposed] strongswan 5.9.5-2ubuntu1 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Thu Feb 3 16:31:14 UTC 2022


strongswan (5.9.5-2ubuntu1) jammy; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - d/control: strongswan-starter hard-depends on strongswan-charon,
      therefore bump the dependency from Recommends to Depends. At the same
      time avoid a circular dependency by dropping
      strongswan-charon->strongswan-starter from Depends to Recommends as the
      binaries can work without the services but not vice versa.
    - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
      + d/control: mention plugins in package description
      + d/rules: enable ntru at build time
      + d/libstrongswan-extra-plugins.install: ship config and shared objects
    - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887)
      + d/control: update libcharon-extra-plugins description.
      + d/libcharon-extra-plugins.install: install .so and conf files.
      + d/rules: add plugins to the configuration arguments.
    - Remove conf files of plugins removed from libcharon-extra-plugins
      + The conf file of the following plugins were removed: eap-aka-3gpp2,
        eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
        eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
      + Created d/libcharon-extra-plugins.maintscript to handle the removals
        properly.
   * Dropped patches included in new version:
    - debian/patches/CVE-2021-45079.patch
    - debian/patches/load-legacy-provider-in-openssl3.patch

strongswan (5.9.5-2) unstable; urgency=medium

  * actually fix lintian overrides

strongswan (5.9.5-1) unstable; urgency=medium

  * New upstream version 5.9.5
    - eap-authenticator: Enforce failure if MSK generation fails
      Fix incorrect handling of Early EAP-Success Messages (CVE-2021-45079)
  * update lintian overrides to match RUNPATH

Date: Thu, 03 Feb 2022 10:49:49 -0500
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/strongswan/5.9.5-2ubuntu1
-------------- next part --------------
Format: 1.8
Date: Thu, 03 Feb 2022 10:49:49 -0500
Source: strongswan
Built-For-Profiles: noudeb
Architecture: source
Version: 5.9.5-2ubuntu1
Distribution: jammy
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Changes:
 strongswan (5.9.5-2ubuntu1) jammy; urgency=medium
 .
   * Merge with Debian unstable. Remaining changes:
     - d/control: strongswan-starter hard-depends on strongswan-charon,
       therefore bump the dependency from Recommends to Depends. At the same
       time avoid a circular dependency by dropping
       strongswan-charon->strongswan-starter from Depends to Recommends as the
       binaries can work without the services but not vice versa.
     - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
       + d/control: mention plugins in package description
       + d/rules: enable ntru at build time
       + d/libstrongswan-extra-plugins.install: ship config and shared objects
     - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887)
       + d/control: update libcharon-extra-plugins description.
       + d/libcharon-extra-plugins.install: install .so and conf files.
       + d/rules: add plugins to the configuration arguments.
     - Remove conf files of plugins removed from libcharon-extra-plugins
       + The conf file of the following plugins were removed: eap-aka-3gpp2,
         eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
         eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
       + Created d/libcharon-extra-plugins.maintscript to handle the removals
         properly.
    * Dropped patches included in new version:
     - debian/patches/CVE-2021-45079.patch
     - debian/patches/load-legacy-provider-in-openssl3.patch
 .
 strongswan (5.9.5-2) unstable; urgency=medium
 .
   * actually fix lintian overrides
 .
 strongswan (5.9.5-1) unstable; urgency=medium
 .
   * New upstream version 5.9.5
     - eap-authenticator: Enforce failure if MSK generation fails
       Fix incorrect handling of Early EAP-Success Messages (CVE-2021-45079)
   * update lintian overrides to match RUNPATH
Checksums-Sha1:
 c3714452c4371f5cdb09f7b2a01e2155b3127c18 3702 strongswan_5.9.5-2ubuntu1.dsc
 50446ea93dd314d6164c9980bd846625246d3a03 4722123 strongswan_5.9.5.orig.tar.bz2
 2fbc316f5df6718e97717a70d4927af1f92c06d4 659 strongswan_5.9.5.orig.tar.bz2.asc
 42bc56f1ab3760dfb1c0ef1c46d257ef781e0602 128068 strongswan_5.9.5-2ubuntu1.debian.tar.xz
 481a46c5d386bebd6914b02a5477c1d7f6532fc1 9954 strongswan_5.9.5-2ubuntu1_source.buildinfo
Checksums-Sha256:
 5c00102e6dc5df0438b0eec208393f5364962a138c7b4794dbe1f350562c741a 3702 strongswan_5.9.5-2ubuntu1.dsc
 983e4ef4a4c6c9d69f5fe6707c7fe0b2b9a9291943bbf4e008faab6bf91c0bdd 4722123 strongswan_5.9.5.orig.tar.bz2
 0421035baa56dbdd04ca969777463e0469804202d2848e151d94844415b36a5d 659 strongswan_5.9.5.orig.tar.bz2.asc
 e1003d8030fe8d2361370da7848ef96108cb7d2920fd293532ac1fb3fa9da4e3 128068 strongswan_5.9.5-2ubuntu1.debian.tar.xz
 98213da815d1e6f4311f4b758d39002c1fe9569d75e1f833ec7162294836ca04 9954 strongswan_5.9.5-2ubuntu1_source.buildinfo
Files:
 16faac6e77b4f5ef9fbc3ebf42042f28 3702 net optional strongswan_5.9.5-2ubuntu1.dsc
 53005324e3cba8592f1fb958b1c2d0e5 4722123 net optional strongswan_5.9.5.orig.tar.bz2
 b36eebdc9e669d3ee955eb733050f0be 659 net optional strongswan_5.9.5.orig.tar.bz2.asc
 abd8f95a1279ece721eec5aace23634e 128068 net optional strongswan_5.9.5-2ubuntu1.debian.tar.xz
 d19e1ef8bb3a934c06de6d7ff7b65f73 9954 net optional strongswan_5.9.5-2ubuntu1_source.buildinfo
Original-Maintainer: strongSwan Maintainers <pkg-swan-devel at lists.alioth.debian.org>


More information about the jammy-changes mailing list