[ All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Package libreswan-4.15-3.el9.x86_64 download

Name libreswan
Epoch 0
Version 4.15
Release 3.el9
Architecture x86_64
Website/URL https://libreswan.org/
License GPLv2
Build Time 2025-02-21 04:19:10
Build Host certified-builder01.msvsphere-os.ru
Summary Internet Key Exchange (IKEv1 and IKEv2) implementation for IPsec
Repositories OS
Description Libreswan is a free implementation of IPsec & IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. Everything passing through the untrusted net is encrypted by the ipsec gateway machine and decrypted by the gateway at the other end of the tunnel. The resulting tunnel is a virtual private network or VPN. This package contains the daemons and userland tools for setting up Libreswan. Libreswan also supports IKEv2 (RFC7296) and Secure Labeling Libreswan is based on Openswan-2.6.38 which in turn is based on FreeS/WAN-2.04
Errata
Size 1388 KiB
Source Project libreswan-4.15-3.el9
SHA-256 checksum a13b13d26836ab43233af1976e8a6ca93324e4afb28a93e75b5b26d4532b6fd2
× Full screenshot
Changelog link
* Tue Aug 06 2024 Daiki Ueno <dueno@redhat.com> - 4.15-3
- Fix release number

* Tue Aug 06 2024 Daiki Ueno <dueno@redhat.com> - 4.15-2
- Fix auto=ondemand connection initialization with TCP (RHEL-51879)
- Make use of Netlink extack for additional error reporting (RHEL-51881)

* Tue Jul 30 2024 Daiki Ueno <dueno@redhat.com> - 4.15-1
- Update to 4.15 (RHEL-50006)

* Thu Jul 11 2024 Daiki Ueno <dueno@redhat.com> - 4.12-4
- Bump release to synchronize with el9_5 package

* Wed Jun 05 2024 Daiki Ueno <dueno@redhat.com> - 4.12-3
- Fix CVE-2024-3652 (RHEL-32483)

* Thu Apr 11 2024 Daiki Ueno <dueno@redhat.com> - 4.12-2
- Fix CVE-2024-2357 (RHEL-28743)
- x509: unpack IPv6 general names based on length (RHEL-32720)

* Wed Aug 09 2023 Daiki Ueno <dueno@redhat.com> - 4.12-1
- Update to 4.12 to fix CVE-2023-38710, CVE-2023-38711, CVE-2023-38712
- Resolves: rhbz#2215956

* Fri May 05 2023 Sahana Prasad <sahana@redhat.com> - 4.9-5
- Just bumping up the version to include bugs for CVE-2023-2295. There is no
  code fix for it. Fix for it is including the code fix for CVE-2023-30570.
- Fix CVE-2023-2295 Regression of CVE-2023-30570 fixes in the
  Red Hat Enterprise Linux
- Resolves: rhbz#2189777, rhbz#2190148

* Thu May 04 2023 Sahana Prasad <sahana@redhat.com> - 4.9-4
- Just bumping up the version as an incorrect 9.3 build was created.
- Related: rhbz#2187171

* Thu May 04 2023 Sahana Prasad <sahana@redhat.com> - 4.9-3
- Fix CVE-2023-30570:Malicious IKEv1 Aggressive Mode packets can crash
  libreswan
- Resolves: rhbz#2187171