://strongswan.org/blog/2015/06/01/strongswan-vulnerability-(cve-2015-3991).html
- --
Mit freundlichen Grüßen/Kind Regards,
Noel Kuntze
GPG Key ID: 0x63EC6658
Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hello Mirko,
So fixes or new versions with fixes will only be backported, if there is a
complete rebuilt scheduled for the release?
Regards,
Noel Kuntze
GPG Key id: 0x63EC6658
Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
Am
-07-02.
Please update the packages.
Lots of people are running vulnerable StrongSwan versions on publicly reachable
OpenWRT routers.
Regards,
Noel Kuntze
GPG Key id: 0x63EC6658
Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
Am 15.04.2014 19:27, schrieb Felix Fietkau:
> On 2014
http://download.strongswan.org/security/CVE-2014-2338/
Regards
Noel Kuntze
- --
GPG Key id: 0x63EC6658 Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F
63EC 6658
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net