Summary: | <net-misc/strongswan-5.3.4: Authentication bypass in eap-mschapv2 plugin (CVE-2015-8023) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | gurligebis, patrick |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1283219 | ||
Whiteboard: | B4 [noglsa/cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() Do go ahead and stabilize 5.3.4 :-) Thanks. net-misc/strongswan-5.3.4 Arches, please test and mark stable: =net-misc/strongswan-5.3.4 Target Keywords : "amd64 arm ppc x86" Thank you! amd64 stable arm stable ppc stable x86 stable. Maintainer(s), please cleanup. Security, please vote. Old version removed. Arches and Maintainer(s), Thank you for your work. GLSA Vote: No Thank you all. Closing as noglsa. |