Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in FreeRADIUS
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in FreeRADIUS
ID: FEDORA-2014-3192
Distribution: Fedora
Plattformen: Fedora 19
Datum: So, 9. März 2014, 14:47
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015
Applikationen: FreeRADIUS

Originalnachricht

Name        : freeradius
Product : Fedora 19
Version : 2.2.3
Release : 7.fc19
URL : http://www.freeradius.org/
Summary : High-performance and highly configurable free RADIUS server
Description :
The FreeRADIUS Server Project is a high performance and highly configurable
GPL'd free RADIUS server. The server is similar in some respects to
Livingston's 2.0 server. While FreeRADIUS started as a variant of the
Cistron RADIUS server, they don't share a lot in common any more. It now
has
many more features than Cistron or Livingston, and is much more configurable.

FreeRADIUS is an Internet authentication daemon, which implements the RADIUS
protocol, as defined in RFC 2865 (and others). It allows Network Access
Servers (NAS boxes) to perform authentication for dial-up users. There are
also RADIUS clients available for Web servers, firewalls, Unix logins, and
more. Using RADIUS allows authentication and authorization for a network to
be centralized, and minimizes the amount of re-configuration which has to be
done when adding or deleting new users.

-------------------------------------------------------------------------------
-
Update Information:

Fix stack-based buffer overflow flaw in rlm_pap module: long password hashes
used by the PAP module can cause a buffer overflow which may terminate the server.
-------------------------------------------------------------------------------
-
ChangeLog:

* Fri Feb 21 2014 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> -
2.2.3-7
- Fix CVE-2014-2015 "freeradius: stack-based buffer overflow flaw in
rlm_pap
module"
- resolves: bug#1066984 (fedora 1066763)
* Tue Jan 14 2014 John Dennis <jdennis@redhat.com> - 2.2.3-6
- Upgrade to upstream 2.2.3 release
See /usr/share/doc/freeradius-2.2.3/ChangeLog for details
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1070427 - CVE-2014-2015 freeradius: stack-based buffer overflow
flaw in rlm_pap module [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1070427
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update freeradius' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung