drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in FreeRADIUS
Name: |
Pufferüberlauf in FreeRADIUS |
|
ID: |
FEDORA-2014-3192 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 19 |
|
Datum: |
So, 9. März 2014, 14:47 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015 |
|
Applikationen: |
FreeRADIUS |
|
Originalnachricht |
Name : freeradius Product : Fedora 19 Version : 2.2.3 Release : 7.fc19 URL : http://www.freeradius.org/ Summary : High-performance and highly configurable free RADIUS server Description : The FreeRADIUS Server Project is a high performance and highly configurable GPL'd free RADIUS server. The server is similar in some respects to Livingston's 2.0 server. While FreeRADIUS started as a variant of the Cistron RADIUS server, they don't share a lot in common any more. It now has many more features than Cistron or Livingston, and is much more configurable.
FreeRADIUS is an Internet authentication daemon, which implements the RADIUS protocol, as defined in RFC 2865 (and others). It allows Network Access Servers (NAS boxes) to perform authentication for dial-up users. There are also RADIUS clients available for Web servers, firewalls, Unix logins, and more. Using RADIUS allows authentication and authorization for a network to be centralized, and minimizes the amount of re-configuration which has to be done when adding or deleting new users.
------------------------------------------------------------------------------- - Update Information:
Fix stack-based buffer overflow flaw in rlm_pap module: long password hashes used by the PAP module can cause a buffer overflow which may terminate the server. ------------------------------------------------------------------------------- - ChangeLog:
* Fri Feb 21 2014 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> - 2.2.3-7 - Fix CVE-2014-2015 "freeradius: stack-based buffer overflow flaw in rlm_pap module" - resolves: bug#1066984 (fedora 1066763) * Tue Jan 14 2014 John Dennis <jdennis@redhat.com> - 2.2.3-6 - Upgrade to upstream 2.2.3 release See /usr/share/doc/freeradius-2.2.3/ChangeLog for details ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1070427 - CVE-2014-2015 freeradius: stack-based buffer overflow flaw in rlm_pap module [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1070427 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update freeradius' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|