Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in FreeRADIUS
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in FreeRADIUS
ID: FEDORA-2014-3184
Distribution: Fedora
Plattformen: Fedora 20
Datum: So, 9. März 2014, 14:47
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015
Applikationen: FreeRADIUS

Originalnachricht

Name        : freeradius
Product : Fedora 20
Version : 3.0.1
Release : 4.fc20
URL : http://www.freeradius.org/
Summary : High-performance and highly configurable free RADIUS server
Description :
The FreeRADIUS Server Project is a high performance and highly configurable
GPL'd free RADIUS server. The server is similar in some respects to
Livingston's 2.0 server. While FreeRADIUS started as a variant of the
Cistron RADIUS server, they don't share a lot in common any more. It now
has
many more features than Cistron or Livingston, and is much more configurable.

FreeRADIUS is an Internet authentication daemon, which implements the RADIUS
protocol, as defined in RFC 2865 (and others). It allows Network Access
Servers (NAS boxes) to perform authentication for dial-up users. There are
also RADIUS clients available for Web servers, firewalls, Unix logins, and
more. Using RADIUS allows authentication and authorization for a network to
be centralized, and minimizes the amount of re-configuration which has to be
done when adding or deleting new users.

-------------------------------------------------------------------------------
-
Update Information:

Fix stack-based buffer overflow flaw in rlm_pap module: long password hashes
used by the PAP module can cause a buffer overflow which may terminate the server.
fixes bug 1068795, string attributes passed to rlm_perl module were being
truncated.
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Feb 24 2014 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> -
3.0.1-4
- Fix CVE-2014-2015 "freeradius: stack-based buffer overflow flaw in
rlm_pap
module"
- resolves: bug#1066984 (fedora 1066763)
* Fri Feb 21 2014 John Dennis <jdennis@redhat.com> - 3.0.1-3
- resolves: bug#1068798 (fedora 1068795)
rlm_perl attribute values truncated
* Sun Jan 19 2014 John Dennis <jdennis@redhat.com> - 3.0.1-2
- resolves: bug#1055073 (fedora 1055072)
rlm_ippool; bad config file attribute and fails to send reply attributes
- resolves: bug#1055567 (fedora 1056227)
bad mysql sql syntax
- change CFLAGS -imacros to -include to address gcc/gdb bug 1004526
where gdb will not display source information, only <command-line>
* Tue Jan 14 2014 John Dennis <jdennis@redhat.com> - 3.0.1-1
- Upgrade to upstream 3.0.1 release, full config compatible with 3.0.0.
This is a roll-up of all upstream bugs fixes found in 3.0.0
See upstream ChangeLog for details (in freeradius-doc subpackage)
- fixes bugs 1053020 1044747 1048474 1043036
* Tue Nov 26 2013 John Dennis <jdennis@redhat.com> - 3.0.0-4
- resolves: bug#1031035
remove radeapclient man page,
upstream no longer supports radeapclient, use eapol_test instead
- resolves: bug#1031061
rlm_eap_leap memory corruption, see freeradius-rlm_leap.patch
- move man pages for utils into utils subpackage from doc subpackage
- fix HAVE_EC_CRYPTO test to include f20
- add new directory /var/run/radiusd/tmp
update mods-available/eap so tls-common.verify.tmpdir to point to it
* Wed Nov 13 2013 John Dennis <jdennis@redhat.com> - 3.0.0-3
- resolves: bug#1029941
PW_TYPE_BOOLEAN config item should be declared int, not bool
* Mon Oct 28 2013 John Dennis <jdennis@redhat.com> - 3.0.0-2
- resolves: bug#1024119
tncfhh-devel is now available in RHEL-7, remove conditional BuildRequires
* Sun Oct 13 2013 John Dennis <jdennis@redhat.com> - 3.0.0-1
- Offical 3.0 gold release from upstream
- resolves: bug#1016873
- resolves: bug#891297
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1066763 - CVE-2014-2015 freeradius: stack-based buffer overflow
flaw in rlm_pap module [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1066763
[ 2 ] Bug #1068795 - rlm_perl attribute values truncated
https://bugzilla.redhat.com/show_bug.cgi?id=1068795
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update freeradius' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung