Описание
Security update for pam_radius
This update for pam_radius fixes the following issues:
- CVE-2015-9542: pam_radius: buffer overflow in password field (bsc#1163933)
This update was imported from the SUSE:SLE-15:Update update project.
Список пакетов
openSUSE Leap 15.2
pam_radius-1.4.0-lp152.4.3.1
pam_radius-32bit-1.4.0-lp152.4.3.1
Ссылки
- E-Mail link for openSUSE-SU-2021:0870-1
- SUSE Security Ratings
- SUSE Bug 1163933
- SUSE CVE CVE-2015-9542 page
Описание
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
Затронутые продукты
openSUSE Leap 15.2:pam_radius-1.4.0-lp152.4.3.1
openSUSE Leap 15.2:pam_radius-32bit-1.4.0-lp152.4.3.1
Ссылки
- CVE-2015-9542
- SUSE Bug 1163933