freeradius (1.1.3-3ubuntu1.1) feisty-security; urgency=low

  * SECURITY UPDATE: denial of service in EAP-TTLS module (LP: #106006).
  * debian/patches/04_CVE-2007-2028.dpatch: Properly free VALUE_PAIR
    structures on rejected authentication, to avoid memory leaks. Patch from
    Red Hat Bugzilla.
  * References
    CVE-2007-2028

 -- William Grant <[EMAIL PROTECTED]>   Tue, 20 Nov 2007
20:10:45 +1100

** Changed in: freeradius (Ubuntu Feisty)
       Status: Fix Committed => Fix Released

-- 
CVE-2007-2028: vulnerable to memory exhaustion via malformed Diameter format 
attributes inside of an EAP-TTLS tunnel
https://bugs.launchpad.net/bugs/106006
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to