On Nov 30, Moritz Muehlenhoff <j...@inutil.org> wrote:

> > https://rpki.exposed/ lists a long number of vulnerabilities affecting 
> Ironically this website is unreachable since at least yesterday :-)
This was the linked page:
https://docs.google.com/spreadsheets/d/1uuDlO6g1DLATV5OVCa20kU9OOiX9XWBFoZT2OkOezi8/edit#gid=0

> > It is not really practical to extract and backport all these patches, so 
> 
> Let's fix these via bullseye-security, version numbers would be:
> rpki-client 7.5-1~deb11u1
> fort-validator 1.5.3-1~deb11u1
> cfrpki 1.4.2-1~deb11u1
Thank you, I have uploaded fort-validator and cfrpki.
I forgot that rpki-client now requires libretls, which is not in 
bullseye, so I will do a backport and discuss what to do with the 
upstream authors.

-- 
ciao,
Marco

Attachment: signature.asc
Description: PGP signature

Reply via email to