UbuntuUpdates.org

Bugs fixes in "freeradius"

Origin Bug number Title Date fixed
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
Launchpad 2042824 smbencrypt segfaults when run with any parameter 2024-02-08
Launchpad 2042824 smbencrypt segfaults when run with any parameter 2024-02-08
Launchpad 2042824 smbencrypt segfaults when run with any parameter 2024-01-20
Launchpad 2042824 smbencrypt segfaults when run with any parameter 2024-01-20
CVE CVE-2022-41861 RESERVED 2023-01-04
CVE CVE-2022-41860 RESERVED 2023-01-04
CVE CVE-2019-17185 In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use 2023-01-04
CVE CVE-2022-41861 RESERVED 2023-01-04



About   -   Send Feedback to @ubuntu_updates