CVE-2015-9542 (https://nvd.nist.gov/vuln/detail/CVE-2015-9542): add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
Readjusting Whiteboard - Not stable in tree
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6f55bc46ee3db205ba4923a067e27d9ac4d548ea commit 6f55bc46ee3db205ba4923a067e27d9ac4d548ea Author: Sam James <sam@gentoo.org> AuthorDate: 2020-08-03 07:57:34 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2020-08-04 02:43:10 +0000 profiles/package.mask: last-rite sys-auth/pam_radius Bug: https://bugs.gentoo.org/710728 Bug: https://bugs.gentoo.org/588606 Signed-off-by: Sam James <sam@gentoo.org> profiles/package.mask | 6 ++++++ 1 file changed, 6 insertions(+)
Package was dropped 20200904.