UbuntuUpdates.org

Bugs fixes in "freeradius"

Origin Bug number Title Date fixed
Launchpad 2087740 Sending CoA message to freeradius will start an endless loop of replies 2025-01-31
Launchpad 2087740 Sending CoA message to freeradius will start an endless loop of replies 2025-01-31
Launchpad 2087740 Sending CoA message to freeradius will start an endless loop of replies 2025-01-31
Launchpad 2087740 Sending CoA message to freeradius will start an endless loop of replies 2025-01-31
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
CVE CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, 2024-10-03
Launchpad 2042824 smbencrypt segfaults when run with any parameter 2024-02-08
Launchpad 2042824 smbencrypt segfaults when run with any parameter 2024-02-08
Launchpad 2042824 smbencrypt segfaults when run with any parameter 2024-01-20
Launchpad 2042824 smbencrypt segfaults when run with any parameter 2024-01-20



About   -   Send Feedback to @ubuntu_updates