Oval Definition:oval:com.redhat.rhsa:def:20172389
Revision Date:2017-08-01Version:637
Title:RHSA-2017:2389: freeradius security update (Important)
Description:FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.

Security Fix(es):

  • An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet. (CVE-2017-10984)

  • An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet. (CVE-2017-10978)

  • An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10983)

  • A denial of service flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to cause the FreeRADIUS server to enter an infinite loop, consume increasing amounts of memory resources, and ultimately crash by sending a specially crafted request packet. (CVE-2017-10985)

  • Multiple out-of-bounds read flaws were found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use these flaws to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10986, CVE-2017-10987)

    Red Hat would like to thank the FreeRADIUS project for reporting these issues. Upstream acknowledges Guido Vranken as the original reporter of these issues.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2017-10978
    CVE-2017-10983
    CVE-2017-10984
    CVE-2017-10985
    CVE-2017-10986
    CVE-2017-10987
    RHSA-2017:2389
    RHSA-2017:2389-01
    Platform(s):Red Hat Enterprise Linux 7
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 7 is installed
  • AND
  • freeradius is earlier than 0:3.0.13-8.el7_4
  • AND freeradius is signed with Red Hat redhatrelease2 key
  • freeradius-devel is earlier than 0:3.0.13-8.el7_4
  • AND freeradius-devel is signed with Red Hat redhatrelease2 key
  • freeradius-doc is earlier than 0:3.0.13-8.el7_4
  • AND freeradius-doc is signed with Red Hat redhatrelease2 key
  • freeradius-krb5 is earlier than 0:3.0.13-8.el7_4
  • AND freeradius-krb5 is signed with Red Hat redhatrelease2 key
  • freeradius-ldap is earlier than 0:3.0.13-8.el7_4
  • AND freeradius-ldap is signed with Red Hat redhatrelease2 key
  • freeradius-mysql is earlier than 0:3.0.13-8.el7_4
  • AND freeradius-mysql is signed with Red Hat redhatrelease2 key
  • freeradius-perl is earlier than 0:3.0.13-8.el7_4
  • AND freeradius-perl is signed with Red Hat redhatrelease2 key
  • freeradius-postgresql is earlier than 0:3.0.13-8.el7_4
  • AND freeradius-postgresql is signed with Red Hat redhatrelease2 key
  • freeradius-python is earlier than 0:3.0.13-8.el7_4
  • AND freeradius-python is signed with Red Hat redhatrelease2 key
  • freeradius-sqlite is earlier than 0:3.0.13-8.el7_4
  • AND freeradius-sqlite is signed with Red Hat redhatrelease2 key
  • freeradius-unixODBC is earlier than 0:3.0.13-8.el7_4
  • AND freeradius-unixODBC is signed with Red Hat redhatrelease2 key
  • freeradius-utils is earlier than 0:3.0.13-8.el7_4
  • AND freeradius-utils is signed with Red Hat redhatrelease2 key
  • BACK