Lucene search

K
mageiaGentoo FoundationMGASA-2014-0088
HistoryFeb 21, 2014 - 10:13 p.m.

Updated freeradius package fixes security vulnerability

2014-02-2122:13:26
Gentoo Foundation
advisories.mageia.org
10

0.008 Low

EPSS

Percentile

81.6%

SSHA processing in freeradius before 2.2.3 runs into a stack-based buffer overflow in the freeradius rlm_pap module if the password source uses an unusually long hashed password (CVE-2014-2015).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchfreeradius< 2.2.0-4.1freeradius-2.2.0-4.1.mga3
Mageia4noarchfreeradius< 2.2.0-5.1freeradius-2.2.0-5.1.mga4