-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello list,

An authentication bypass vulnerability has been revealed by the strongSwan 
team. All versions of strongSwan since 4.0.7 are affected.
All affected packages need to be patched.
The patches for the different version can be gotten from 
http://download.strongswan.org/security/CVE-2014-2338/

Regards
Noel Kuntze

- -- 
GPG Key id: 0x63EC6658 Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 
63EC 6658
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQIcBAEBAgAGBQJTTGJRAAoJEDg5KY9j7GZYRDkP/RpZw4oZIGIed1dRb3b5yHfH
roXU2xFUgAWGcmMyggpWdz95LYupehgPEQPOA9Dt/RqevEdPd5kRsC3VFfohpm+4
icqXg4MeCxOJ1/ThBsOcvbDm7wpIlNj/HYo0ibipSw6ih44+T31bAhg0mZBzCQnq
CiUc1PpNIiWJ0clNaqGUNnUQvCfdXd1JKokl6SIHhKLHOc1aRowHEkKuVN4RwHlR
zUvY9apIpkbartnowZD0SZE8eXdpdu4PYGqMYseRQ21mvdsEIljNcMtpxCMNFbuO
nPQQzlQEohy7ST+XM/94Xy2vNbWT/3vSBFxeqteTCB+dV4ekgSXlNxDTV3cc6B5N
jO98pgivpH35WGbEGdL+UJmV6GOw31G2rCX6bRViYA/VMjjp4Y60Oz7r7qv7kXUD
36F4fNg8JDhqtZqEnmYX8NFhZO4HYSUNZJu/YitU3Rs7E5bhtNUXlTp+ZZ7aI8OZ
dj8WJjcEKw4HRQoqCC6a+Th1+Hf6X5sUff6lYhI7RNNs1p5ty7hkXTp/1a+3Yc8K
vUjT/XlaWwOHENOJJV/M2tRdUJhcCcE8tajapRSP0QKZX3wnUyFHfQMVVOY9tvT3
Uem485Hvplmy/Lqpqe/6d9TzcECjTeNq2JBXhlqZXZpDNH7Tzq7EsRGu6iJGGLEV
w1blr1DuirXzglOeDvPM
=531/
-----END PGP SIGNATURE-----
_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel

Reply via email to