Описание
Security update for pam_radius
This update for pam_radius fixes the following issues:
- CVE-2015-9542: Fixed a buffer overflow in password field (bsc#1163933).
- On s390x didn't decrypt passwords correctly (bsc#1141670).
Список пакетов
HPE Helion OpenStack 8
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE Enterprise Storage 5
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE Linux Enterprise Server 12 SP1-LTSS
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE Linux Enterprise Server 12 SP2-BCL
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE Linux Enterprise Server 12 SP2-LTSS
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE Linux Enterprise Server 12 SP3-BCL
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE Linux Enterprise Server 12 SP3-LTSS
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE Linux Enterprise Server 12 SP4
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE Linux Enterprise Server 12 SP5
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE OpenStack Cloud 7
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE OpenStack Cloud 8
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
SUSE OpenStack Cloud Crowbar 8
pam_radius-1.3.16-239.4.1
pam_radius-32bit-1.3.16-239.4.1
Ссылки
- Link for SUSE-SU-2020:1117-1
- E-Mail link for SUSE-SU-2020:1117-1
- SUSE Security Ratings
- SUSE Bug 1141670
- SUSE Bug 1163933
- SUSE CVE CVE-2015-9542 page
Описание
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
Затронутые продукты
HPE Helion OpenStack 8:pam_radius-1.3.16-239.4.1
HPE Helion OpenStack 8:pam_radius-32bit-1.3.16-239.4.1
SUSE Enterprise Storage 5:pam_radius-1.3.16-239.4.1
SUSE Enterprise Storage 5:pam_radius-32bit-1.3.16-239.4.1
Ссылки
- CVE-2015-9542
- SUSE Bug 1163933