[ubuntu/eoan-updates] libpam-radius-auth 1.3.17-0ubuntu5.19.10.1 (Accepted)

Ubuntu Archive Robot cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk
Mon Feb 24 14:28:10 UTC 2020


libpam-radius-auth (1.3.17-0ubuntu5.19.10.1) eoan-security; urgency=medium

  * SECURITY UPDATE: DoS via stack overflow in password field
    - debian/patches/CVE-2015-9542-1.patch: use length, which has been
      limited in size in src/pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-2.patch: clear out trailing part of the
      buffer in src/pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-3.patch: copy password to buffer before
      rounding length in src/pam_radius_auth.c.
    - debian/rules: added new patches.
    - CVE-2015-9542

Date: 2020-02-19 13:08:33.587850+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
Signed-By: Ubuntu Archive Robot <cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/libpam-radius-auth/1.3.17-0ubuntu5.19.10.1
-------------- next part --------------
Sorry, changesfile not available.


More information about the Eoan-changes mailing list