Описание
ELSA-2012-1327: freeradius2 security update (MODERATE)
[2.1.12-4]
- resolves: bug#855315 CVE-2012-3547 freeradius: Stack-based buffer overflow by processing certain expiration date fields of a certificate during x509 certificate validation
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
freeradius2
2.1.12-4.el5_8
freeradius2-krb5
2.1.12-4.el5_8
freeradius2-ldap
2.1.12-4.el5_8
freeradius2-mysql
2.1.12-4.el5_8
freeradius2-perl
2.1.12-4.el5_8
freeradius2-postgresql
2.1.12-4.el5_8
freeradius2-python
2.1.12-4.el5_8
freeradius2-unixODBC
2.1.12-4.el5_8
freeradius2-utils
2.1.12-4.el5_8
Oracle Linux x86_64
freeradius2
2.1.12-4.el5_8
freeradius2-krb5
2.1.12-4.el5_8
freeradius2-ldap
2.1.12-4.el5_8
freeradius2-mysql
2.1.12-4.el5_8
freeradius2-perl
2.1.12-4.el5_8
freeradius2-postgresql
2.1.12-4.el5_8
freeradius2-python
2.1.12-4.el5_8
freeradius2-unixODBC
2.1.12-4.el5_8
freeradius2-utils
2.1.12-4.el5_8
Oracle Linux i386
freeradius2
2.1.12-4.el5_8
freeradius2-krb5
2.1.12-4.el5_8
freeradius2-ldap
2.1.12-4.el5_8
freeradius2-mysql
2.1.12-4.el5_8
freeradius2-perl
2.1.12-4.el5_8
freeradius2-postgresql
2.1.12-4.el5_8
freeradius2-python
2.1.12-4.el5_8
freeradius2-unixODBC
2.1.12-4.el5_8
freeradius2-utils
2.1.12-4.el5_8
Связанные CVE
Связанные уязвимости
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS ...
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.