On Nov 30, Moritz Muehlenhoff <j...@inutil.org> wrote: > > https://rpki.exposed/ lists a long number of vulnerabilities affecting > Ironically this website is unreachable since at least yesterday :-) This was the linked page: https://docs.google.com/spreadsheets/d/1uuDlO6g1DLATV5OVCa20kU9OOiX9XWBFoZT2OkOezi8/edit#gid=0
> > It is not really practical to extract and backport all these patches, so > > Let's fix these via bullseye-security, version numbers would be: > rpki-client 7.5-1~deb11u1 > fort-validator 1.5.3-1~deb11u1 > cfrpki 1.4.2-1~deb11u1 Thank you, I have uploaded fort-validator and cfrpki. I forgot that rpki-client now requires libretls, which is not in bullseye, so I will do a backport and discuss what to do with the upstream authors. -- ciao, Marco
signature.asc
Description: PGP signature