Debian Security Advisory
DLA-1064-1 freeradius -- LTS security update
- Date Reported:
- 25 Aug 2017
- Affected Packages:
- freeradius
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 868765.
In Mitre's CVE dictionary: CVE-2017-10978, CVE-2017-10979, CVE-2017-10980, CVE-2017-10981, CVE-2017-10982, CVE-2017-10983. - More information:
-
Guido Vranken discovered that FreeRADIUS, an open source implementation of RADIUS, the IETF protocol for AAA (Authorisation, Authentication, and Accounting), did not properly handle memory when processing packets. This would allow a remote attacker to cause a denial-of-service by application crash, or potentially execute arbitrary code.
For Debian 7
Wheezy
, these problems have been fixed in version 2.1.12+dfsg-1.2+deb7u2.We recommend that you upgrade your freeradius packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS