Hello Adolf,

Yes, this is good thing to do.

The vulnerability reads as this:

  Fixed a vulnerability in the eap-mschapv2 plugin related to processing 
Failure Request packets on the client that can lead to a heap-based buffer 
overflow and potentially remote code execution. This vulnerability has been 
registered as CVE-2025-62291. Please refer to our blog for details.

So it would not affect us as we are not using this plugin, but we should update 
regardless.

Best,
-Michael

> On 6 Nov 2025, at 19:46, Adolf Belka <[email protected]> wrote:
> 
> Hi all,
> 
> I have found that there is a new strongswan update that has a CVE fix in it.
> 
> I will also do an update for that after the suricata update has been 
> submitted.
> 
> Regards,
> 
> Adolf.
> 
> 


Reply via email to