Tue, 29 Apr 2025 01:46:21 MSK | login

Information for build libreswan-4.15-3.el9_5.3

ID26613
Package Namelibreswan
Version4.15
Release3.el9_5.3
Epoch
Sourcegit+http://git.inferitos.ru/rpms/libreswan#bf0c6cf3d8e5a7b77c3b9c11d9204a1070e42b13
SummaryInternet Key Exchange (IKEv1 and IKEv2) implementation for IPsec
DescriptionLibreswan is a free implementation of IPsec & IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. Everything passing through the untrusted net is encrypted by the ipsec gateway machine and decrypted by the gateway at the other end of the tunnel. The resulting tunnel is a virtual private network or VPN. This package contains the daemons and userland tools for setting up Libreswan. Libreswan also supports IKEv2 (RFC7296) and Secure Labeling Libreswan is based on Openswan-2.6.38 which in turn is based on FreeS/WAN-2.04
Built bysys_devci
State complete
Volume DEFAULT
StartedWed, 19 Mar 2025 09:04:52 MSK
CompletedWed, 19 Mar 2025 09:09:32 MSK
Taskbuild (inferit-9_5-candidate, /rpms/libreswan/:changed/i9c/libreswan-4.15-3.el9_5.3)
Extra{'source': {'original_url': 'git+http://git.inferitos.ru/rpms/libreswan/?#changed/i9c/libreswan-4.15-3.el9_5.3'}}
Tags
inferit-9_5-gate
inferit-9_5-updates
RPMs
src
libreswan-4.15-3.el9_5.3.src.rpm (info) (download)
aarch64
libreswan-4.15-3.el9_5.3.aarch64.rpm (info) (download)
libreswan-debuginfo-4.15-3.el9_5.3.aarch64.rpm (info) (download)
libreswan-debugsource-4.15-3.el9_5.3.aarch64.rpm (info) (download)
i686
libreswan-4.15-3.el9_5.3.i686.rpm (info) (download)
libreswan-debuginfo-4.15-3.el9_5.3.i686.rpm (info) (download)
libreswan-debugsource-4.15-3.el9_5.3.i686.rpm (info) (download)
x86_64
libreswan-4.15-3.el9_5.3.x86_64.rpm (info) (download)
libreswan-debuginfo-4.15-3.el9_5.3.x86_64.rpm (info) (download)
libreswan-debugsource-4.15-3.el9_5.3.x86_64.rpm (info) (download)
Logs
aarch64
root.log
state.log
mock_output.log
installed_pkgs.log
hw_info.log
build.log
i686
root.log
state.log
mock_output.log
installed_pkgs.log
hw_info.log
build.log
x86_64
root.log
state.log
mock_output.log
installed_pkgs.log
hw_info.log
build.log
Changelog * Fri Jan 24 2025 Daiki Ueno <dueno@redhat.com> - 4.15-3.3 - showhostkey: fix regression after RHEL-68755 (RHEL-75967) * Fri Nov 22 2024 Daiki Ueno <dueno@redhat.com> - 4.15-3.2 - crypto: refcnt struct secret_pubkey_stuff when passing to helper thread (RHEL-68755) * Tue Nov 12 2024 Daiki Ueno <dueno@redhat.com> - 4.15-3.1 - pluto: ignore CREATE_CHILD_SA request if crypto is in progress (RHEL-71496) * Tue Aug 06 2024 Daiki Ueno <dueno@redhat.com> - 4.15-3 - Fix release number * Tue Aug 06 2024 Daiki Ueno <dueno@redhat.com> - 4.15-2 - Fix auto=ondemand connection initialization with TCP (RHEL-51879) - Make use of Netlink extack for additional error reporting (RHEL-51881) * Tue Jul 30 2024 Daiki Ueno <dueno@redhat.com> - 4.15-1 - Update to 4.15 (RHEL-50006) * Thu Jul 11 2024 Daiki Ueno <dueno@redhat.com> - 4.12-4 - Bump release to synchronize with el9_5 package * Wed Jun 05 2024 Daiki Ueno <dueno@redhat.com> - 4.12-3 - Fix CVE-2024-3652 (RHEL-32483) * Thu Apr 11 2024 Daiki Ueno <dueno@redhat.com> - 4.12-2 - Fix CVE-2024-2357 (RHEL-28743) - x509: unpack IPv6 general names based on length (RHEL-32720) * Wed Aug 09 2023 Daiki Ueno <dueno@redhat.com> - 4.12-1 - Update to 4.12 to fix CVE-2023-38710, CVE-2023-38711, CVE-2023-38712 - Resolves: rhbz#2215956 * Fri May 05 2023 Sahana Prasad <sahana@redhat.com> - 4.9-5 - Just bumping up the version to include bugs for CVE-2023-2295. There is no code fix for it. Fix for it is including the code fix for CVE-2023-30570. - Fix CVE-2023-2295 Regression of CVE-2023-30570 fixes in the Red Hat Enterprise Linux - Resolves: rhbz#2189777, rhbz#2190148 * Thu May 04 2023 Sahana Prasad <sahana@redhat.com> - 4.9-4 - Just bumping up the version as an incorrect 9.3 build was created. - Related: rhbz#2187171 * Thu May 04 2023 Sahana Prasad <sahana@redhat.com> - 4.9-3 - Fix CVE-2023-30570:Malicious IKEv1 Aggressive Mode packets can crash libreswan - Resolves: rhbz#2187171 * Tue Apr 04 2023 Daiki Ueno <dueno@redhat.com> - 4.9-2 - Fix CVE-2023-23009: remote DoS via crafted TS payload with an incorrect selector length (rhbz#2173674) * Wed Mar 15 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 4.9-1 - Rebuilt for MSVSphere 9.1.