strongswan: add upstream security patch
authorPeter Korsgaard <peter@korsgaard.com>
Sun, 30 Sep 2018 20:12:15 +0000 (22:12 +0200)
committerPeter Korsgaard <peter@korsgaard.com>
Mon, 1 Oct 2018 12:31:28 +0000 (14:31 +0200)
commit5e04cdde197f17472a85423f4063b8f6ee19a82c
treea62c9b410bf4702dc375e1617bcca9fb98e6d599
parentc32cd4b925fc596ee2db2bfd7a0c3faaeae06849
strongswan: add upstream security patch

Fixes the following security issues:

CVE-2018-16151: The OID parser in the ASN.1 code in gmp allows any number of
random bytes after a valid OID.

CVE-2018-16152: The algorithmIdentifier parser in the ASN.1 code in gmp
doesn't enforce a NULL value for the optional parameter which is not used
with any PKCS#1 algorithm.

For more details, see the advisory:
https://www.strongswan.org/blog/2018/09/24/strongswan-vulnerability-(cve-2018-16151,-cve-2018-16152).html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/strongswan/strongswan.hash
package/strongswan/strongswan.mk