drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in FreeRADIUS
Name: |
Pufferüberlauf in FreeRADIUS |
|
ID: |
FEDORA-2014-3184 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 20 |
|
Datum: |
So, 9. März 2014, 14:47 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015 |
|
Applikationen: |
FreeRADIUS |
|
Originalnachricht |
Name : freeradius Product : Fedora 20 Version : 3.0.1 Release : 4.fc20 URL : http://www.freeradius.org/ Summary : High-performance and highly configurable free RADIUS server Description : The FreeRADIUS Server Project is a high performance and highly configurable GPL'd free RADIUS server. The server is similar in some respects to Livingston's 2.0 server. While FreeRADIUS started as a variant of the Cistron RADIUS server, they don't share a lot in common any more. It now has many more features than Cistron or Livingston, and is much more configurable.
FreeRADIUS is an Internet authentication daemon, which implements the RADIUS protocol, as defined in RFC 2865 (and others). It allows Network Access Servers (NAS boxes) to perform authentication for dial-up users. There are also RADIUS clients available for Web servers, firewalls, Unix logins, and more. Using RADIUS allows authentication and authorization for a network to be centralized, and minimizes the amount of re-configuration which has to be done when adding or deleting new users.
------------------------------------------------------------------------------- - Update Information:
Fix stack-based buffer overflow flaw in rlm_pap module: long password hashes used by the PAP module can cause a buffer overflow which may terminate the server. fixes bug 1068795, string attributes passed to rlm_perl module were being truncated. ------------------------------------------------------------------------------- - ChangeLog:
* Mon Feb 24 2014 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> - 3.0.1-4 - Fix CVE-2014-2015 "freeradius: stack-based buffer overflow flaw in rlm_pap module" - resolves: bug#1066984 (fedora 1066763) * Fri Feb 21 2014 John Dennis <jdennis@redhat.com> - 3.0.1-3 - resolves: bug#1068798 (fedora 1068795) rlm_perl attribute values truncated * Sun Jan 19 2014 John Dennis <jdennis@redhat.com> - 3.0.1-2 - resolves: bug#1055073 (fedora 1055072) rlm_ippool; bad config file attribute and fails to send reply attributes - resolves: bug#1055567 (fedora 1056227) bad mysql sql syntax - change CFLAGS -imacros to -include to address gcc/gdb bug 1004526 where gdb will not display source information, only <command-line> * Tue Jan 14 2014 John Dennis <jdennis@redhat.com> - 3.0.1-1 - Upgrade to upstream 3.0.1 release, full config compatible with 3.0.0. This is a roll-up of all upstream bugs fixes found in 3.0.0 See upstream ChangeLog for details (in freeradius-doc subpackage) - fixes bugs 1053020 1044747 1048474 1043036 * Tue Nov 26 2013 John Dennis <jdennis@redhat.com> - 3.0.0-4 - resolves: bug#1031035 remove radeapclient man page, upstream no longer supports radeapclient, use eapol_test instead - resolves: bug#1031061 rlm_eap_leap memory corruption, see freeradius-rlm_leap.patch - move man pages for utils into utils subpackage from doc subpackage - fix HAVE_EC_CRYPTO test to include f20 - add new directory /var/run/radiusd/tmp update mods-available/eap so tls-common.verify.tmpdir to point to it * Wed Nov 13 2013 John Dennis <jdennis@redhat.com> - 3.0.0-3 - resolves: bug#1029941 PW_TYPE_BOOLEAN config item should be declared int, not bool * Mon Oct 28 2013 John Dennis <jdennis@redhat.com> - 3.0.0-2 - resolves: bug#1024119 tncfhh-devel is now available in RHEL-7, remove conditional BuildRequires * Sun Oct 13 2013 John Dennis <jdennis@redhat.com> - 3.0.0-1 - Offical 3.0 gold release from upstream - resolves: bug#1016873 - resolves: bug#891297 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1066763 - CVE-2014-2015 freeradius: stack-based buffer overflow flaw in rlm_pap module [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1066763 [ 2 ] Bug #1068795 - rlm_perl attribute values truncated https://bugzilla.redhat.com/show_bug.cgi?id=1068795 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update freeradius' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|