Hello Adolf, Yes, this is good thing to do.
The vulnerability reads as this: Fixed a vulnerability in the eap-mschapv2 plugin related to processing Failure Request packets on the client that can lead to a heap-based buffer overflow and potentially remote code execution. This vulnerability has been registered as CVE-2025-62291. Please refer to our blog for details. So it would not affect us as we are not using this plugin, but we should update regardless. Best, -Michael > On 6 Nov 2025, at 19:46, Adolf Belka <[email protected]> wrote: > > Hi all, > > I have found that there is a new strongswan update that has a CVE fix in it. > > I will also do an update for that after the suricata update has been > submitted. > > Regards, > > Adolf. > >
