-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 02 Oct 2018 10:56:21 +0100
Source: strongswan
Binary: strongswan libstrongswan libstrongswan-standard-plugins
libstrongswan-extra-plugins libcharon-extra-plugins strongswan-dbg
strongswan-starter strongswan-libcharon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Package: strongswan
Version: 5.2.1-6+deb8u8
CVE ID : CVE-2018-17540
It was discovered that there was a denial-of-service vulnerability in
strongswan, a virtual private network (VPN) client and server.
Verification of an RSA
Removed:
ghostscript 9.06~dfsg-2+deb8u9
ghostscript-dbg 9.06~dfsg-2+deb8u9
ghostscript-doc 9.06~dfsg-2+deb8u9
ghostscript-x 9.06~dfsg-2+deb8u9
libgs-dev 9.06~dfsg-2+deb8u9
libgs9 9.06~dfsg-2+deb8u9
libgs9-common 9.06~dfsg-2+deb8u9
Upgraded.
On Mon, Oct 01, 2018 at 03:20:53PM
Hi,
On 16/09/2018 21:57, Markus Koschany wrote:
>
> Am 16.09.2018 um 21:51 schrieb Ola Lundqvist:
>> Hi
>>
>> Do you mean 60.2? I do not see any criticial vulnerabilities fixed in 60.
>>
>> I see a note that we need to go up to 60.x release once the 52 release
>> goes end of life.
>
> Emilio is