MGASA-2014-0088

Source
https://advisories.mageia.org/MGASA-2014-0088.html
Import Source
https://advisories.mageia.org/MGASA-2014-0088.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0088
Related
Published
2014-02-21T18:13:26Z
Modified
2014-02-21T18:13:07Z
Summary
Updated freeradius package fixes security vulnerability
Details

SSHA processing in freeradius before 2.2.3 runs into a stack-based buffer overflow in the freeradius rlm_pap module if the password source uses an unusually long hashed password (CVE-2014-2015).

References
Credits

Affected packages