Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-4935

Опубликовано: 31 июл. 2024
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2024-4935: freeradius security update (IMPORTANT)

[3.0.21-40]

  • Backport fixes for BlastRADIUS CVE Resolves: RHEL-46566

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

freeradius

3.0.21-40.el9_4

freeradius-devel

3.0.21-40.el9_4

freeradius-doc

3.0.21-40.el9_4

freeradius-krb5

3.0.21-40.el9_4

freeradius-ldap

3.0.21-40.el9_4

freeradius-mysql

3.0.21-40.el9_4

freeradius-perl

3.0.21-40.el9_4

freeradius-postgresql

3.0.21-40.el9_4

freeradius-rest

3.0.21-40.el9_4

freeradius-sqlite

3.0.21-40.el9_4

freeradius-unixODBC

3.0.21-40.el9_4

freeradius-utils

3.0.21-40.el9_4

python3-freeradius

3.0.21-40.el9_4

Oracle Linux x86_64

freeradius

3.0.21-40.el9_4

freeradius-devel

3.0.21-40.el9_4

freeradius-doc

3.0.21-40.el9_4

freeradius-krb5

3.0.21-40.el9_4

freeradius-ldap

3.0.21-40.el9_4

freeradius-mysql

3.0.21-40.el9_4

freeradius-perl

3.0.21-40.el9_4

freeradius-postgresql

3.0.21-40.el9_4

freeradius-rest

3.0.21-40.el9_4

freeradius-sqlite

3.0.21-40.el9_4

freeradius-unixODBC

3.0.21-40.el9_4

freeradius-utils

3.0.21-40.el9_4

python3-freeradius

3.0.21-40.el9_4

Связанные CVE

Связанные уязвимости

CVSS3: 9
ubuntu
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
redhat
12 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
nvd
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 7.5
msrc
12 месяцев назад

CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability

CVSS3: 9
debian
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a ...