Your message dated Thu, 26 May 2005 21:17:09 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#307720: fixed in freeradius 1.0.2-4 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 26 May 2005 11:04:00 +0000 >From [EMAIL PROTECTED] Thu May 26 04:03:59 2005 Return-path: <[EMAIL PROTECTED]> Received: from mail01.pironet-ndh.com (mail02.pironet-ndh.com) [194.64.31.10] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DbG9f-0001GW-00; Thu, 26 May 2005 04:03:59 -0700 Received: from mail.fbn-dd.de (mail.fbn-dd.de [195.227.105.178]) by mail02.pironet-ndh.com (Postfix) with ESMTP id 198184D92BA for <[EMAIL PROTECTED]>; Thu, 26 May 2005 13:03:28 +0200 (CEST) Received: from sonne.intranet.fbn-dd.de (192-168-0-1.transfer-000.intranet.fbn-dd.de [192.168.0.1]) by mail.fbn-dd.de (Postfix) with ESMTP id A5504262DD for <[EMAIL PROTECTED]>; Thu, 26 May 2005 13:03:28 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by sonne.intranet.fbn-dd.de (Postfix) with ESMTP id 8EA641F747 for <[EMAIL PROTECTED]>; Thu, 26 May 2005 13:03:28 +0200 (CEST) Received: from sonne.intranet.fbn-dd.de (localhost [127.0.0.1]) by localhost (AvMailGate-2.0.1.16) id 08642-35393EF0; Thu, 26 May 2005 13:03:28 +0200 Received: from localhost.localdomain (10-28-130-200.intranet-28-130.fbn-dd.de [10.28.130.200]) by sonne.intranet.fbn-dd.de (Postfix) with ESMTP id 4B8791F737 for <[EMAIL PROTECTED]>; Thu, 26 May 2005 13:03:28 +0200 (CEST) Received: by localhost.localdomain (Postfix, from userid 1000) id 31570945D; Thu, 26 May 2005 13:03:30 +0200 (CEST) Date: Thu, 26 May 2005 13:03:30 +0200 From: Martin Pitt <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: freeradius: [CAN-2005-1455] buffer overflow Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="HCdXmnRlPgeNBad2" Content-Disposition: inline User-Agent: Mutt/1.5.9i X-AntiVirus: checked by AntiVir MailGate (version: 2.0.1.16; AVE: 6.30.0.15; VDF: 6.30.0.202; host: sonne) Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: --HCdXmnRlPgeNBad2 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Package: freeradius Version: 1.0.2-3 Severity: grave Tags: security freeradius seems to be vulnerable against a buffer overflow: http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2005-1455 http://www.securityfocus.com/bid/13541 Thanks in advance for checking, Martin --=20 Martin Pitt http://www.piware.de Ubuntu Developer http://www.ubuntulinux.org Debian Developer http://www.debian.org --HCdXmnRlPgeNBad2 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCla0CDecnbV4Fd/IRAjl1AKC4B3bYnP2ZErYedrCq6MHegLHB3QCdHudj QsNhtvh/hDhaTaJrAQdqU28= =Chpo -----END PGP SIGNATURE----- --HCdXmnRlPgeNBad2-- --------------------------------------- Received: (at 307720-close) by bugs.debian.org; 27 May 2005 01:26:37 +0000 >From [EMAIL PROTECTED] Thu May 26 18:26:37 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DbTcS-00036W-00; Thu, 26 May 2005 18:26:36 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DbTTJ-0008FS-00; Thu, 26 May 2005 21:17:09 -0400 From: Paul Hampson <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#307720: fixed in freeradius 1.0.2-4 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Thu, 26 May 2005 21:17:09 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: freeradius Source-Version: 1.0.2-4 We believe that the bug you reported is fixed in the latest version of freeradius, which is due to be installed in the Debian FTP archive: freeradius-dialupadmin_1.0.2-4_all.deb to pool/main/f/freeradius/freeradius-dialupadmin_1.0.2-4_all.deb freeradius-iodbc_1.0.2-4_i386.deb to pool/main/f/freeradius/freeradius-iodbc_1.0.2-4_i386.deb freeradius-krb5_1.0.2-4_i386.deb to pool/main/f/freeradius/freeradius-krb5_1.0.2-4_i386.deb freeradius-ldap_1.0.2-4_i386.deb to pool/main/f/freeradius/freeradius-ldap_1.0.2-4_i386.deb freeradius-mysql_1.0.2-4_i386.deb to pool/main/f/freeradius/freeradius-mysql_1.0.2-4_i386.deb freeradius_1.0.2-4.diff.gz to pool/main/f/freeradius/freeradius_1.0.2-4.diff.gz freeradius_1.0.2-4.dsc to pool/main/f/freeradius/freeradius_1.0.2-4.dsc freeradius_1.0.2-4_i386.deb to pool/main/f/freeradius/freeradius_1.0.2-4_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Paul Hampson <[EMAIL PROTECTED]> (supplier of updated freeradius package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Mon, 23 May 2005 18:53:51 +1000 Source: freeradius Binary: freeradius-mysql freeradius-krb5 freeradius freeradius-iodbc freeradius-ldap freeradius-dialupadmin Architecture: source i386 all Version: 1.0.2-4 Distribution: unstable Urgency: high Maintainer: Paul Hampson <[EMAIL PROTECTED]> Changed-By: Paul Hampson <[EMAIL PROTECTED]> Description: freeradius - a high-performance and highly configurable RADIUS server freeradius-dialupadmin - set of PHP scripts for administering a FreeRADIUS server freeradius-iodbc - iODBC module for FreeRADIUS server freeradius-krb5 - kerberos module for FreeRADIUS server freeradius-ldap - LDAP module for FreeRADIUS server freeradius-mysql - MySQL module for FreeRADIUS server Closes: 307720 Changes: freeradius (1.0.2-4) unstable; urgency=high . * Security fix stolen from CVS release_1_0 branch: - Always use sql_escape_func when calling radius_xlat - Add a test in sql_escape_func() to check buffer bound when input character needs escaping. - Urgency high as these are (theoretical) security issues. Closes: #307720 (Thanks to Primoz Bratanic and Nicolas Baradakis) Files: c5bbf558bb19a4127273de6b32d0cb9d 885 net optional freeradius_1.0.2-4.dsc f398e368fa522b55ecd648550eeeca6b 15048 net optional freeradius_1.0.2-4.diff.gz f4f526580ffcab989e3dcbdb704abdea 2032072 net optional freeradius_1.0.2-4_i386.deb bc144be31021e77cd92699ca87a246fa 52394 net optional freeradius-krb5_1.0.2-4_i386.deb 183f4bb81d3e041f786bed55bd573cd3 97356 net optional freeradius-ldap_1.0.2-4_i386.deb 48b58846c2ed81a1699c43c704762313 53142 net optional freeradius-mysql_1.0.2-4_i386.deb fe4cde7cd0941c1ff7d0c62da5227e8d 51294 net optional freeradius-iodbc_1.0.2-4_i386.deb c7c153d619b6b951524691472fd86c3e 111214 net optional freeradius-dialupadmin_1.0.2-4_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFClnEhdu+M6Iexz7URAsxhAJ9NN9fEJQ+FnnxLDPNpsGWsnc2a6QCfZtMI 4Z+JJo3LBp4rcsC1qNU4yFI= =TS+f -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]