libpam-radius-auth (1.3.17-0ubuntu4.1) xenial-security; urgency=medium
* SECURITY UPDATE: DoS via stack overflow in password field
- debian/patches/CVE-2015-9542-1.patch: use length, which has been
limited in size in src/pam_radius_auth.c.
- debian/patches/CVE-2015-9542-2.patch: clear out trailing part of the
buffer in src/pam_radius_auth.c.
- debian/patches/CVE-2015-9542-3.patch: copy password to buffer before
rounding length in src/pam_radius_auth.c.
- debian/rules: added new patches.
- CVE-2015-9542
Date: 2020-02-19 13:23:23.621830+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
https://launchpad.net/ubuntu/+source/libpam-radius-auth/1.3.17-0ubuntu4.1
Sorry, changesfile not available.
--
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/xenial-changes