[gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201406-12.xml
creffett14/06/15 00:16:06 Added:glsa-201406-12.xml Log: GLSA 201406-12 Revision ChangesPath 1.1 xml/htdocs/security/en/glsa/glsa-201406-12.xml file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&view=markup plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&content-type=text/plain Index: glsa-201406-12.xml === http://www.gentoo.org/dtd/glsa.dtd";> FreeRADIUS: Arbitrary code execution A vulnerability in FreeRADIUS can lead to arbitrary code execution or Denial of Service by authenticated users. freeradius June 15, 2014 June 15, 2014: 1 501754 remote 2.2.5 2.2.5 FreeRADIUS is an open source RADIUS authentication server. Large passwords can trigger a stack-based buffer overflow in FreeRADIUS’s rlm_pap module when authenticating against an LDAP server. An authenticated user could set a specially crafted long password, possibly leading to arbitrary code execution or a Denial of Service condition. There is no known workaround at this time. All FreeRADIUS users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-2.2.5" http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015";>CVE-2014-2015 BlueKnight creffett
[gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201406-12.xml
creffett14/06/15 00:16:06 Added:glsa-201406-12.xml Log: GLSA 201406-12 Revision ChangesPath 1.1 xml/htdocs/security/en/glsa/glsa-201406-12.xml file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&view=markup plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&content-type=text/plain Index: glsa-201406-12.xml === http://www.gentoo.org/dtd/glsa.dtd";> FreeRADIUS: Arbitrary code execution A vulnerability in FreeRADIUS can lead to arbitrary code execution or Denial of Service by authenticated users. freeradius June 15, 2014 June 15, 2014: 1 501754 remote 2.2.5 2.2.5 FreeRADIUS is an open source RADIUS authentication server. Large passwords can trigger a stack-based buffer overflow in FreeRADIUS’s rlm_pap module when authenticating against an LDAP server. An authenticated user could set a specially crafted long password, possibly leading to arbitrary code execution or a Denial of Service condition. There is no known workaround at this time. All FreeRADIUS users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-2.2.5" http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015";>CVE-2014-2015 BlueKnight creffett
[gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201406-12.xml
creffett14/06/15 00:16:06 Added:glsa-201406-12.xml Log: GLSA 201406-12 Revision ChangesPath 1.1 xml/htdocs/security/en/glsa/glsa-201406-12.xml file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&view=markup plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&content-type=text/plain Index: glsa-201406-12.xml === http://www.gentoo.org/dtd/glsa.dtd";> FreeRADIUS: Arbitrary code execution A vulnerability in FreeRADIUS can lead to arbitrary code execution or Denial of Service by authenticated users. freeradius June 15, 2014 June 15, 2014: 1 501754 remote 2.2.5 2.2.5 FreeRADIUS is an open source RADIUS authentication server. Large passwords can trigger a stack-based buffer overflow in FreeRADIUS’s rlm_pap module when authenticating against an LDAP server. An authenticated user could set a specially crafted long password, possibly leading to arbitrary code execution or a Denial of Service condition. There is no known workaround at this time. All FreeRADIUS users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-2.2.5" http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015";>CVE-2014-2015 BlueKnight creffett
[gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201406-12.xml
creffett14/06/15 00:16:06 Added:glsa-201406-12.xml Log: GLSA 201406-12 Revision ChangesPath 1.1 xml/htdocs/security/en/glsa/glsa-201406-12.xml file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&view=markup plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&content-type=text/plain Index: glsa-201406-12.xml === http://www.gentoo.org/dtd/glsa.dtd";> FreeRADIUS: Arbitrary code execution A vulnerability in FreeRADIUS can lead to arbitrary code execution or Denial of Service by authenticated users. freeradius June 15, 2014 June 15, 2014: 1 501754 remote 2.2.5 2.2.5 FreeRADIUS is an open source RADIUS authentication server. Large passwords can trigger a stack-based buffer overflow in FreeRADIUS’s rlm_pap module when authenticating against an LDAP server. An authenticated user could set a specially crafted long password, possibly leading to arbitrary code execution or a Denial of Service condition. There is no known workaround at this time. All FreeRADIUS users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-2.2.5" http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015";>CVE-2014-2015 BlueKnight creffett
[gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201406-12.xml
creffett14/06/15 00:16:06 Added:glsa-201406-12.xml Log: GLSA 201406-12 Revision ChangesPath 1.1 xml/htdocs/security/en/glsa/glsa-201406-12.xml file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&view=markup plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&content-type=text/plain Index: glsa-201406-12.xml === http://www.gentoo.org/dtd/glsa.dtd";> FreeRADIUS: Arbitrary code execution A vulnerability in FreeRADIUS can lead to arbitrary code execution or Denial of Service by authenticated users. freeradius June 15, 2014 June 15, 2014: 1 501754 remote 2.2.5 2.2.5 FreeRADIUS is an open source RADIUS authentication server. Large passwords can trigger a stack-based buffer overflow in FreeRADIUS’s rlm_pap module when authenticating against an LDAP server. An authenticated user could set a specially crafted long password, possibly leading to arbitrary code execution or a Denial of Service condition. There is no known workaround at this time. All FreeRADIUS users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-2.2.5" http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015";>CVE-2014-2015 BlueKnight creffett
[gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201406-12.xml
creffett14/06/15 00:16:06 Added:glsa-201406-12.xml Log: GLSA 201406-12 Revision ChangesPath 1.1 xml/htdocs/security/en/glsa/glsa-201406-12.xml file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&view=markup plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&content-type=text/plain Index: glsa-201406-12.xml === http://www.gentoo.org/dtd/glsa.dtd";> FreeRADIUS: Arbitrary code execution A vulnerability in FreeRADIUS can lead to arbitrary code execution or Denial of Service by authenticated users. freeradius June 15, 2014 June 15, 2014: 1 501754 remote 2.2.5 2.2.5 FreeRADIUS is an open source RADIUS authentication server. Large passwords can trigger a stack-based buffer overflow in FreeRADIUS’s rlm_pap module when authenticating against an LDAP server. An authenticated user could set a specially crafted long password, possibly leading to arbitrary code execution or a Denial of Service condition. There is no known workaround at this time. All FreeRADIUS users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-2.2.5" http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015";>CVE-2014-2015 BlueKnight creffett