Index of /security/CVE-2018-16151

[ICO]NameLast modifiedSize
[PARENTDIR]Parent Directory  -
[TXT]strongswan-5.3.1-5.6.0_gmp-pkcs1-verify.patch2018-09-03 17:53 9.2K
[TXT]strongswan-5.6.1-5.6.3_gmp-pkcs1-verify.patch2018-09-03 17:53 9.1K
[TXT]strongswan-4.4.0-4.4.1_gmp-pkcs1-verify.patch2018-09-18 14:21 9.1K
[TXT]strongswan-4.5.1-5.0.0_gmp-pkcs1-verify.patch2018-09-18 14:21 9.1K
[TXT]strongswan-5.0.1-5.3.0_gmp-pkcs1-verify.patch2018-09-18 14:21 9.2K
[TXT]strongswan-4.4.0-4.4.1_gmp-pkcs1-verify.patch.sig2018-09-23 18:48 648
[TXT]strongswan-4.5.1-5.0.0_gmp-pkcs1-verify.patch.sig2018-09-23 18:48 648
[TXT]strongswan-5.0.1-5.3.0_gmp-pkcs1-verify.patch.sig2018-09-23 18:48 648
[TXT]strongswan-5.3.1-5.6.0_gmp-pkcs1-verify.patch.sig2018-09-23 18:48 648
[TXT]strongswan-5.6.1-5.6.3_gmp-pkcs1-verify.patch.sig2018-09-23 18:48 648

Prerequisites

In order to apply these patches, those for CVE-2012-2388 (versions <= 4.6.3) and CVE-2017-11185 (versions <= 5.5.3) have to be applied already.

The fix for CVE-2017-9022 (versions <= 5.5.2) is also recommended, although the patches also apply without it.