Ubuntu Security Notice 3369-1 - Guido Vranken discovered that FreeRADIUS incorrectly handled memory when decoding packets. A remote attacker could use this issue to cause FreeRADIUS to crash or hang, resulting in a denial of service, or possibly execute arbitrary code.
2d7269bf484f6ead1a2687767dc01354af1b32f08cd2d4f72d0baaf9e1c1f6c3
==========================================================================
Ubuntu Security Notice USN-3369-1
July 27, 2017
freeradius vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in FreeRADIUS.
Software Description:
- freeradius: high-performance and highly configurable RADIUS server
Details:
Guido Vranken discovered that FreeRADIUS incorrectly handled memory when
decoding packets. A remote attacker could use this issue to cause
FreeRADIUS to crash or hang, resulting in a denial of service, or possibly
execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
freeradius 3.0.12+dfsg-4ubuntu1.2
Ubuntu 16.04 LTS:
freeradius 2.2.8+dfsg-0.1ubuntu0.1
Ubuntu 14.04 LTS:
freeradius 2.1.12+dfsg-1.2ubuntu8.2
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3369-1
CVE-2017-10978, CVE-2017-10979, CVE-2017-10980, CVE-2017-10981,
CVE-2017-10982, CVE-2017-10983, CVE-2017-10984, CVE-2017-10985,
CVE-2017-10986, CVE-2017-10987
Package Information:
https://launchpad.net/ubuntu/+source/freeradius/3.0.12+dfsg-4ubuntu1.2
https://launchpad.net/ubuntu/+source/freeradius/2.2.8+dfsg-0.1ubuntu0.1
https://launchpad.net/ubuntu/+source/freeradius/2.1.12+dfsg-1.2ubuntu8.2