Security update for freeradius
SUSE Security Update: Security update for freeradius
This update fixes a denial of service (crash) security
issue rlm_pap hash processing in FreeRadius, which could
have been caused by special passwords fed into the RLM-PAP
password checking method via LDAP by remote attackers.
Security Issue reference:
* CVE-2014-2015
>
Announcement ID: | SUSE-SU-2014:0525-1 |
Rating: | low |
References: | #864576 |
Affected Products: |
An update that fixes one vulnerability is now available.
Description:
This update fixes a denial of service (crash) security
issue rlm_pap hash processing in FreeRadius, which could
have been caused by special passwords fed into the RLM-PAP
password checking method via LDAP by remote attackers.
Security Issue reference:
* CVE-2014-2015
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-freeradius-server-8968
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-freeradius-server-8968
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-freeradius-server-8968
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
- freeradius-server-devel-2.1.1-7.18.1
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):
- freeradius-server-libs-2.1.1-7.18.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
- freeradius-server-2.1.1-7.18.1
- freeradius-server-dialupadmin-2.1.1-7.18.1
- freeradius-server-doc-2.1.1-7.18.1
- freeradius-server-libs-2.1.1-7.18.1
- freeradius-server-utils-2.1.1-7.18.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
- freeradius-server-2.1.1-7.18.1
- freeradius-server-dialupadmin-2.1.1-7.18.1
- freeradius-server-doc-2.1.1-7.18.1
- freeradius-server-libs-2.1.1-7.18.1
- freeradius-server-utils-2.1.1-7.18.1
References:
- http://support.novell.com/security/cve/CVE-2014-2015.html
- https://bugzilla.novell.com/864576
- http://download.suse.com/patch/finder/?keywords=c3896d7e5c74c86a7370e3e110867c58