freeradius (2.1.12+dfsg-1.2ubuntu8) trusty; urgency=medium

  * SECURITY UPDATE: denial of service and possible code execution via
    buffer overflow in rlm_pap module
    - debian/patches/CVE-2013-2015.patch: properly handle buffer size in
      src/modules/rlm_pap/rlm_pap.c.
    - CVE-2014-2015

Date: Mon, 24 Feb 2014 09:13:43 -0500
Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com>
https://launchpad.net/ubuntu/trusty/+source/freeradius/2.1.12+dfsg-1.2ubuntu8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 24 Feb 2014 09:13:43 -0500
Source: freeradius
Binary: freeradius freeradius-common freeradius-utils libfreeradius2 
libfreeradius-dev freeradius-krb5 freeradius-ldap freeradius-postgresql 
freeradius-mysql freeradius-iodbc freeradius-dialupadmin freeradius-dbg
Architecture: source
Version: 2.1.12+dfsg-1.2ubuntu8
Distribution: trusty
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com>
Description: 
 freeradius - high-performance and highly configurable RADIUS server
 freeradius-common - FreeRADIUS common files
 freeradius-dbg - debug symbols for the FreeRADIUS packages
 freeradius-dialupadmin - set of PHP scripts for administering a FreeRADIUS 
server
 freeradius-iodbc - iODBC module for FreeRADIUS server
 freeradius-krb5 - kerberos module for FreeRADIUS server
 freeradius-ldap - LDAP module for FreeRADIUS server
 freeradius-mysql - MySQL module for FreeRADIUS server
 freeradius-postgresql - PostgreSQL module for FreeRADIUS server
 freeradius-utils - FreeRADIUS client utilities
 libfreeradius-dev - FreeRADIUS shared library development files
 libfreeradius2 - FreeRADIUS shared library
Changes: 
 freeradius (2.1.12+dfsg-1.2ubuntu8) trusty; urgency=medium
 .
   * SECURITY UPDATE: denial of service and possible code execution via
     buffer overflow in rlm_pap module
     - debian/patches/CVE-2013-2015.patch: properly handle buffer size in
       src/modules/rlm_pap/rlm_pap.c.
     - CVE-2014-2015
Checksums-Sha1: 
 4cf20d430a52d931882433bcf58ff1f926ec9648 2843 
freeradius_2.1.12+dfsg-1.2ubuntu8.dsc
 1b5b1694f0bfdbbada16fc0ba639b7a9a1320d4c 83469 
freeradius_2.1.12+dfsg-1.2ubuntu8.debian.tar.gz
Checksums-Sha256: 
 2fe2e2b44735046dc566ceae41828d89d796028f133a4404016970f3e64e5fba 2843 
freeradius_2.1.12+dfsg-1.2ubuntu8.dsc
 733de85ad686bae4bf7db9bcda882942f5555cede42e400cba12e4d22839fb05 83469 
freeradius_2.1.12+dfsg-1.2ubuntu8.debian.tar.gz
Files: 
 62d892885f4eb3f5b07a29a41ddb9277 2843 net optional 
freeradius_2.1.12+dfsg-1.2ubuntu8.dsc
 31270c99b6ffbeab9469549183b41d1a 83469 net optional 
freeradius_2.1.12+dfsg-1.2ubuntu8.debian.tar.gz
Original-Maintainer: Josip Rodin <joy-packa...@debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=WDhM
-----END PGP SIGNATURE-----
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes

Reply via email to