1
Candidate: CVE-2013-4147
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4147
5
http://www.openwall.com/lists/oss-security/2013/07/19/1
7
Multiple format string vulnerabilities in Yet Another Radius Daemon (YARD
8
RADIUS) 1.1.2 allow context-dependent attackers to cause a denial of
9
service (crash) or possibly execute arbitrary code via format string
10
specifiers in a request in the (1) log_msg function in log.c or (2) version
11
or (3) build_version function in version.c.
15
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714612
16
https://bugs.launchpad.net/ubuntu/+source/yardradius/+bug/1196265
22
upstream_yardradius: needed
23
lucid_yardradius: ignored (reached end-of-life)
24
precise_yardradius: ignored (reached end-of-life)
25
precise/esm_yardradius: DNE (precise was needed)
26
quantal_yardradius: ignored (reached end-of-life)
27
raring_yardradius: ignored (reached end-of-life)
28
saucy_yardradius: ignored (reached end-of-life)
29
trusty_yardradius: needed
30
utopic_yardradius: DNE
32
vivid/stable-phone-overlay_yardradius: DNE
33
vivid/ubuntu-core_yardradius: DNE
35
xenial_yardradius: DNE
36
yakkety_yardradius: DNE
38
artful_yardradius: DNE
39
bionic_yardradius: DNE