Описание
ELSA-2013-0134: freeradius2 security and bug fix update (LOW)
[2.1.12-5]
- resolves: bug#855308 CVE-2012-3547 freeradius: Stack-based buffer overflow by processing certain expiration date fields of a certificate during x509 certificate validation
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
freeradius2
2.1.12-5.el5
freeradius2-krb5
2.1.12-5.el5
freeradius2-ldap
2.1.12-5.el5
freeradius2-mysql
2.1.12-5.el5
freeradius2-perl
2.1.12-5.el5
freeradius2-postgresql
2.1.12-5.el5
freeradius2-python
2.1.12-5.el5
freeradius2-unixODBC
2.1.12-5.el5
freeradius2-utils
2.1.12-5.el5
Oracle Linux x86_64
freeradius2
2.1.12-5.el5
freeradius2-krb5
2.1.12-5.el5
freeradius2-ldap
2.1.12-5.el5
freeradius2-mysql
2.1.12-5.el5
freeradius2-perl
2.1.12-5.el5
freeradius2-postgresql
2.1.12-5.el5
freeradius2-python
2.1.12-5.el5
freeradius2-unixODBC
2.1.12-5.el5
freeradius2-utils
2.1.12-5.el5
Oracle Linux i386
freeradius2
2.1.12-5.el5
freeradius2-krb5
2.1.12-5.el5
freeradius2-ldap
2.1.12-5.el5
freeradius2-mysql
2.1.12-5.el5
freeradius2-perl
2.1.12-5.el5
freeradius2-postgresql
2.1.12-5.el5
freeradius2-python
2.1.12-5.el5
freeradius2-unixODBC
2.1.12-5.el5
freeradius2-utils
2.1.12-5.el5
Связанные CVE
Связанные уязвимости
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode ...
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.