Bugs fixes in "freeradius"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
Launchpad | 2104372 | freeradius 3.2.5 crashes when configured with status_check=status-server and the server is not responding | 2025-04-28 |
Launchpad | 2104372 | freeradius 3.2.5 crashes when configured with status_check=status-server and the server is not responding | 2025-04-28 |
Launchpad | 2104372 | freeradius 3.2.5 crashes when configured with status_check=status-server and the server is not responding | 2025-04-17 |
Launchpad | 2104372 | freeradius 3.2.5 crashes when configured with status_check=status-server and the server is not responding | 2025-04-17 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-02-26 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-02-26 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-02-26 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-02-26 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-02-26 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-02-26 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-01-31 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-01-31 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-01-31 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-01-31 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-01-31 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-01-31 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
About
-
Send Feedback to @ubuntu_updates