SUSE-SU-2023:0135-1

Source
https://www.suse.com/support/update/announcement/2023/suse-su-20230135-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:0135-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2023:0135-1
Related
Published
2023-01-25T10:20:38Z
Modified
2023-01-25T10:20:38Z
Summary
Security update for freeradius-server
Details

This update for freeradius-server fixes the following issues:

  • CVE-2022-41859: Fixed an issue in EAP-PWD that could leak information about the password, which could facilitate dictionary attacks (bsc#1206204).
  • CVE-2022-41860: Fixed a crash in servers with EAP_SIM manually configured, which could be triggered via a malformed SIM option (bsc#1206205).
  • CVE-2022-41861: Fixed a server crash that could be triggered by sending malformed data from a system in the RADIUS circle of trust (bsc#1206206).
References

Affected packages

SUSE:Linux Enterprise Server 12 SP2-BCL / freeradius-server

Package

Name
freeradius-server
Purl
pkg:rpm/suse/freeradius-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.3-17.18.1

Ecosystem specific

{
    "binaries": [
        {
            "freeradius-server-libs": "3.0.3-17.18.1",
            "freeradius-server-doc": "3.0.3-17.18.1",
            "freeradius-server": "3.0.3-17.18.1",
            "freeradius-server-mysql": "3.0.3-17.18.1",
            "freeradius-server-krb5": "3.0.3-17.18.1",
            "freeradius-server-utils": "3.0.3-17.18.1",
            "freeradius-server-sqlite": "3.0.3-17.18.1",
            "freeradius-server-postgresql": "3.0.3-17.18.1",
            "freeradius-server-ldap": "3.0.3-17.18.1",
            "freeradius-server-perl": "3.0.3-17.18.1",
            "freeradius-server-python": "3.0.3-17.18.1"
        }
    ]
}