* Strongswan 6.0.3 update with CVE fix
@ 2025-11-06 19:46 Adolf Belka
2025-11-06 20:19 ` Michael Tremer
0 siblings, 1 reply; 2+ messages in thread
From: Adolf Belka @ 2025-11-06 19:46 UTC (permalink / raw)
To: IPFire: Development-List
Hi all,
I have found that there is a new strongswan update that has a CVE fix in it.
I will also do an update for that after the suricata update has been submitted.
Regards,
Adolf.
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: Strongswan 6.0.3 update with CVE fix
2025-11-06 19:46 Strongswan 6.0.3 update with CVE fix Adolf Belka
@ 2025-11-06 20:19 ` Michael Tremer
0 siblings, 0 replies; 2+ messages in thread
From: Michael Tremer @ 2025-11-06 20:19 UTC (permalink / raw)
To: Adolf Belka; +Cc: IPFire: Development-List
Hello Adolf,
Yes, this is good thing to do.
The vulnerability reads as this:
Fixed a vulnerability in the eap-mschapv2 plugin related to processing Failure Request packets on the client that can lead to a heap-based buffer overflow and potentially remote code execution. This vulnerability has been registered as CVE-2025-62291. Please refer to our blog for details.
So it would not affect us as we are not using this plugin, but we should update regardless.
Best,
-Michael
> On 6 Nov 2025, at 19:46, Adolf Belka <adolf.belka@ipfire.org> wrote:
>
> Hi all,
>
> I have found that there is a new strongswan update that has a CVE fix in it.
>
> I will also do an update for that after the suricata update has been submitted.
>
> Regards,
>
> Adolf.
>
>
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2025-11-06 20:19 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2025-11-06 19:46 Strongswan 6.0.3 update with CVE fix Adolf Belka
2025-11-06 20:19 ` Michael Tremer
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox