Summary: | <net-dialup/freeradius-2.2.5: stack-based buffer overflow flaw in rlm_pap module (CVE-2014-2015) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | barzog, jer, net-dialup |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1066761 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 489958 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2014-02-19 08:39:46 UTC
Arch teams, please test and mark stable: =net-dialup/freeradius-2.2.5 Targeted stable KEYWORDS : amd64 x86 amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches and Maintainer(s), Thank you for your work. Added to new GLSA Request This issue was resolved and addressed in GLSA 201406-12 at http://security.gentoo.org/glsa/glsa-201406-12.xml by GLSA coordinator Chris Reffett (creffett). |