update for strongswan

- Applied upstream fix for a denial-of-service and authorization
bypass vulnerability via crafted ID payload in strongswan 4.3.3
up to 5.1.0 (CVE-2013-6075, bnc#847506).
[0007-strongswan-4.3.3_5.1.0-bnc-847506-CVE-2013-6075.patch]
- Added a recursion limit to get_route in netlink plugin to avoid
a charon crash while trying to find a source address when local
left is set to %any on newer kernels sorting the default route
as first one (bnc#840826).
[0006-strongswan-4.6.4-bnc-840826-recursion-limit.patch]

Fixed bugs
bnc#840826
L3: strongswan: charon does SEGFAULT when left=%any is used
bnc#847506
VUL-0: EMBARGOED: CVE-2013-6075: strongswan DoS and authorization bypass vulnerability via crafted ID payload
Selected Binaries
openSUSE Build Service is sponsored by