Summary: | <net-misc/strongswan-5.3.4: Authentication bypass in eap-mschapv2 plugin (CVE-2015-8023) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | gurligebis, patrick |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1283219 | ||
Whiteboard: | B4 [noglsa/cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2015-11-18 14:33:39 UTC
Do go ahead and stabilize 5.3.4 :-) Thanks. net-misc/strongswan-5.3.4 Arches, please test and mark stable: =net-misc/strongswan-5.3.4 Target Keywords : "amd64 arm ppc x86" Thank you! amd64 stable arm stable ppc stable x86 stable. Maintainer(s), please cleanup. Security, please vote. Old version removed. Arches and Maintainer(s), Thank you for your work. GLSA Vote: No Thank you all. Closing as noglsa. |