UbuntuUpdates.org

Package "freeradius"

Name: freeradius

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • set of PHP scripts for administering a FreeRADIUS server
  • iODBC module for FreeRADIUS server
  • kerberos module for FreeRADIUS server
  • LDAP module for FreeRADIUS server

Latest version: 2.1.10+dfsg-3ubuntu0.12.04.2
Release: precise (12.04)
Level: security
Repository: universe

Links



Other versions of "freeradius" in Precise

Repository Area Version
base main 2.1.10+dfsg-3build2
base universe 2.1.10+dfsg-3build2
security main 2.1.10+dfsg-3ubuntu0.12.04.2
updates main 2.1.10+dfsg-3ubuntu0.12.04.2
updates universe 2.1.10+dfsg-3ubuntu0.12.04.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.1.10+dfsg-3ubuntu0.12.04.2 2014-02-26 14:06:56 UTC

  freeradius (2.1.10+dfsg-3ubuntu0.12.04.2) precise-security; urgency=medium

  * SECURITY UPDATE: incorrect password expiration check
    - debian/patches/CVE-2011-4966.patch: check for both account and
      password expiration in src/modules/rlm_unix/rlm_unix.c.
    - CVE-2011-4966
  * SECURITY UPDATE: denial of service and possible code execution via
    buffer overflow in rlm_pap module
    - debian/patches/CVE-2013-2015.patch: properly handle buffer size in
      src/modules/rlm_pap/rlm_pap.c.
    - CVE-2014-2015
 -- Marc Deslauriers <email address hidden> Mon, 24 Feb 2014 09:19:58 -0500

Source diff to previous version
CVE-2011-4966 modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode ...
CVE-2013-2015 The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel ...
CVE-2014-2015 denial of service in rlm_pap hash processing

Version: 2.1.10+dfsg-3ubuntu0.12.04.1 2012-09-26 15:07:19 UTC

  freeradius (2.1.10+dfsg-3ubuntu0.12.04.1) precise-security; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via
    crafted client certificates
    - debian/patches/CVE-2012-3547.diff: use correct size in
      src/modules/rlm_eap/types/rlm_eap_tls/rlm_eap_tls.c.
    - CVE-2012-3547
 -- Marc Deslauriers <email address hidden> Mon, 24 Sep 2012 12:46:41 -0400

CVE-2012-3547 EAP-TLS buffer overflow



About   -   Send Feedback to @ubuntu_updates