{"affected":[{"ecosystem_specific":{"binaries":[{"freeradius-server-devel":"3.0.15-2.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP3","name":"freeradius-server","purl":"pkg:rpm/suse/freeradius-server&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.15-2.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"freeradius-server":"3.0.15-2.3.1","freeradius-server-doc":"3.0.15-2.3.1","freeradius-server-krb5":"3.0.15-2.3.1","freeradius-server-ldap":"3.0.15-2.3.1","freeradius-server-libs":"3.0.15-2.3.1","freeradius-server-mysql":"3.0.15-2.3.1","freeradius-server-perl":"3.0.15-2.3.1","freeradius-server-postgresql":"3.0.15-2.3.1","freeradius-server-python":"3.0.15-2.3.1","freeradius-server-sqlite":"3.0.15-2.3.1","freeradius-server-utils":"3.0.15-2.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"freeradius-server","purl":"pkg:rpm/suse/freeradius-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.15-2.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"freeradius-server":"3.0.15-2.3.1","freeradius-server-doc":"3.0.15-2.3.1","freeradius-server-krb5":"3.0.15-2.3.1","freeradius-server-ldap":"3.0.15-2.3.1","freeradius-server-libs":"3.0.15-2.3.1","freeradius-server-mysql":"3.0.15-2.3.1","freeradius-server-perl":"3.0.15-2.3.1","freeradius-server-postgresql":"3.0.15-2.3.1","freeradius-server-python":"3.0.15-2.3.1","freeradius-server-sqlite":"3.0.15-2.3.1","freeradius-server-utils":"3.0.15-2.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"freeradius-server","purl":"pkg:rpm/suse/freeradius-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.15-2.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for freeradius-server fixes the following issues:\n\n- update to 3.0.15 (bsc#1049086)\n  * Bind the lifetime of program name and python path to the module\n  * CVE-2017-10978: FR-GV-201: Check input / output length in make_secret() (bsc#1049086)\n  * CVE-2017-10983: FR-GV-206: Fix read overflow when decoding DHCP option 63 (bsc#1049086)\n  * CVE-2017-10984: FR-GV-301: Fix write overflow in data2vp_wimax() (bsc#1049086) \n  * CVE-2017-10985: FR-GV-302: Fix infinite loop and memory exhaustion with 'concat' attributes (bsc#1049086)\n  * CVE-2017-10986: FR-GV-303: Fix infinite read in dhcp_attr2vp() (bsc#1049086)\n  * CVE-2017-10987: FR-GV-304: Fix buffer over-read in fr_dhcp_decode_suboptions() (bsc#1049086)\n  * CVE-2017-10988: FR-GV-305: Decode 'signed' attributes correctly. (bsc#1049086) \n  * FR-AD-001: use strncmp() instead of memcmp() for bounded data\n  * Print messages when we see deprecated configuration items\n  * Show reasons why we couldn't parse a certificate expiry time\n  * Be more accepting about truncated ASN1 times.\n  * Fix OpenSSL API issue which could leak small amounts of memory.\n  * For Access-Reject, call rad_authlog() after running the\n    post-auth section, just like for Access-Accept.\n  * Don't crash when reading corrupted data from session resumption\n    cache.\n  * Parse port in dhcpclient.\n  * Don't leak memory for OpenSSL.\n  * Portability fixes taken from OpenBSD port collection.\n  * run rad_authlog after post-auth for Access-Reject.\n  * Don't process VMPS packets twice.\n  * Fix attribute truncation in rlm_perl\n  * Fix bug when processing huntgroups.\n  * FR-AD-002 - Bind the lifetime of program name and python path to the module\n  * FR-AD-003 - Pass correct statement length into sqlite3_prepare[_v2]\n","id":"SUSE-SU-2017:2202-1","modified":"2017-08-17T06:39:20Z","published":"2017-08-17T06:39:20Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20172202-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049086"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10983"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10984"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10985"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10986"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10987"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10988"}],"related":["CVE-2017-10978","CVE-2017-10983","CVE-2017-10984","CVE-2017-10985","CVE-2017-10986","CVE-2017-10987","CVE-2017-10988"],"summary":"Security update for freeradius-server","upstream":["CVE-2017-10978","CVE-2017-10983","CVE-2017-10984","CVE-2017-10985","CVE-2017-10986","CVE-2017-10987","CVE-2017-10988"]}