MGASA-2014-0088

Source
https://advisories.mageia.org/MGASA-2014-0088.html
Import Source
https://advisories.mageia.org/MGASA-2014-0088.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0088
Related
Published
2014-02-21T18:13:26Z
Modified
2014-02-21T18:13:07Z
Summary
Updated freeradius package fixes security vulnerability
Details

SSHA processing in freeradius before 2.2.3 runs into a stack-based buffer overflow in the freeradius rlm_pap module if the password source uses an unusually long hashed password (CVE-2014-2015).

References
Credits

Affected packages

Mageia:4 / freeradius

Package

Name
freeradius
Purl
pkg:rpm/mageia/freeradius?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.0-5.1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / freeradius

Package

Name
freeradius
Purl
pkg:rpm/mageia/freeradius?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.0-4.1.mga3

Ecosystem specific

{
    "section": "core"
}