Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:2361-1

Опубликовано: 09 июл. 2024
Источник: suse-cvrf

Описание

Security update for freeradius-server

This update for freeradius-server fixes the following issues:

  • CVE-2024-3596: Fixed chosen-prefix collision attack against MD5 (bsc#1223414).

Список пакетов

SUSE Linux Enterprise Server 12 SP5
freeradius-server-3.0.19-3.15.1
freeradius-server-doc-3.0.19-3.15.1
freeradius-server-krb5-3.0.19-3.15.1
freeradius-server-ldap-3.0.19-3.15.1
freeradius-server-libs-3.0.19-3.15.1
freeradius-server-mysql-3.0.19-3.15.1
freeradius-server-perl-3.0.19-3.15.1
freeradius-server-postgresql-3.0.19-3.15.1
freeradius-server-python-3.0.19-3.15.1
freeradius-server-sqlite-3.0.19-3.15.1
freeradius-server-utils-3.0.19-3.15.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
freeradius-server-3.0.19-3.15.1
freeradius-server-doc-3.0.19-3.15.1
freeradius-server-krb5-3.0.19-3.15.1
freeradius-server-ldap-3.0.19-3.15.1
freeradius-server-libs-3.0.19-3.15.1
freeradius-server-mysql-3.0.19-3.15.1
freeradius-server-perl-3.0.19-3.15.1
freeradius-server-postgresql-3.0.19-3.15.1
freeradius-server-python-3.0.19-3.15.1
freeradius-server-sqlite-3.0.19-3.15.1
freeradius-server-utils-3.0.19-3.15.1
SUSE Linux Enterprise Software Development Kit 12 SP5
freeradius-server-devel-3.0.19-3.15.1

Описание

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1
SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1
SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1
SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1

Ссылки