libpam-radius-auth (1.3.17-0ubuntu3.1) precise-security; urgency=medium

   [ Marc Deslauriers ]
   * SECURITY UPDATE: DoS via stack overflow in password field
    - debian/patches/CVE-2015-9542-1.patch: use length, which has been
      limited in size in pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-2.patch: clear out trailing part of the
      buffer in pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-3.patch: copy password to buffer before
      rounding length in pam_radius_auth.c.
    - debian/rules: added new patches.
    - CVE-2015-9542

Date: 2020-02-20 16:23:14.919779+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
Signed-By: Steve Langasek <steve.langa...@canonical.com>
https://launchpad.net/ubuntu/+source/libpam-radius-auth/1.3.17-0ubuntu3.1
Sorry, changesfile not available.
-- 
Precise-changes mailing list
Precise-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/precise-changes

Reply via email to