Bugs fixes in "freeradius"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
Launchpad | 2042824 | smbencrypt segfaults when run with any parameter | 2024-02-08 |
Launchpad | 2042824 | smbencrypt segfaults when run with any parameter | 2024-02-08 |
Launchpad | 2042824 | smbencrypt segfaults when run with any parameter | 2024-01-20 |
Launchpad | 2042824 | smbencrypt segfaults when run with any parameter | 2024-01-20 |
CVE | CVE-2022-41861 | RESERVED | 2023-01-04 |
CVE | CVE-2022-41860 | RESERVED | 2023-01-04 |
CVE | CVE-2019-17185 | In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use | 2023-01-04 |
CVE | CVE-2022-41861 | RESERVED | 2023-01-04 |
About
-
Send Feedback to @ubuntu_updates