Bugs fixes in "freeradius"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-01-31 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-01-31 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-01-31 |
Launchpad | 2087740 | Sending CoA message to freeradius will start an endless loop of replies | 2025-01-31 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
CVE | CVE-2024-3596 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, | 2024-10-03 |
Launchpad | 2042824 | smbencrypt segfaults when run with any parameter | 2024-02-08 |
Launchpad | 2042824 | smbencrypt segfaults when run with any parameter | 2024-02-08 |
Launchpad | 2042824 | smbencrypt segfaults when run with any parameter | 2024-01-20 |
Launchpad | 2042824 | smbencrypt segfaults when run with any parameter | 2024-01-20 |
About
-
Send Feedback to @ubuntu_updates