Bug 1163933 - (CVE-2015-9542) VUL-0: CVE-2015-9542: pam_radius: buffer overflow in password field
(CVE-2015-9542)
VUL-0: CVE-2015-9542: pam_radius: buffer overflow in password field
Status: REOPENED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/252922/
CVSSv3.1:SUSE:CVE-2015-9542:6.5:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-02-17 13:43 UTC by Alexander Bergmann
Modified: 2022-11-14 10:37 UTC (History)
7 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2020-02-17 13:43:13 UTC
rh#1686980

A vulnerability was found in pam_radius : the password length check was done incorrectly in the add_password() function, resulting in a stack based buffer overflow.

This could be used to crash (DoS) an application using the PAM stack for authentication.

Upstream fixes:
https://github.com/FreeRADIUS/pam_radius/commit/01173ec
https://github.com/FreeRADIUS/pam_radius/commit/6bae92d
https://github.com/FreeRADIUS/pam_radius/commit/ac2c1677

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1686980
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-9542
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-9542.html
Comment 1 Marcus Meissner 2020-04-12 09:21:10 UTC
Wolfgang, this bugfix was missing in your last pam-radius submnission.

Please add
Comment 3 Swamp Workflow Management 2020-04-27 13:33:32 UTC
SUSE-SU-2020:1117-1: An update that solves one vulnerability and has one errata is now available.

Category: security (important)
Bug References: 1141670,1163933
CVE References: CVE-2015-9542
Sources used:
SUSE OpenStack Cloud Crowbar 8 (src):    pam_radius-1.3.16-239.4.1
SUSE OpenStack Cloud 8 (src):    pam_radius-1.3.16-239.4.1
SUSE OpenStack Cloud 7 (src):    pam_radius-1.3.16-239.4.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    pam_radius-1.3.16-239.4.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    pam_radius-1.3.16-239.4.1
SUSE Linux Enterprise Server for SAP 12-SP1 (src):    pam_radius-1.3.16-239.4.1
SUSE Linux Enterprise Server 12-SP5 (src):    pam_radius-1.3.16-239.4.1
SUSE Linux Enterprise Server 12-SP4 (src):    pam_radius-1.3.16-239.4.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    pam_radius-1.3.16-239.4.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    pam_radius-1.3.16-239.4.1
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    pam_radius-1.3.16-239.4.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    pam_radius-1.3.16-239.4.1
SUSE Linux Enterprise Server 12-SP1-LTSS (src):    pam_radius-1.3.16-239.4.1
SUSE Enterprise Storage 5 (src):    pam_radius-1.3.16-239.4.1
HPE Helion Openstack 8 (src):    pam_radius-1.3.16-239.4.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Swamp Workflow Management 2021-06-08 17:13:32 UTC
SUSE-SU-2021:1896-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1163933
CVE References: CVE-2015-9542
JIRA References: 
Sources used:
SUSE Manager Server 4.0 (src):    pam_radius-1.4.0-3.3.1
SUSE Manager Retail Branch Server 4.0 (src):    pam_radius-1.4.0-3.3.1
SUSE Manager Proxy 4.0 (src):    pam_radius-1.4.0-3.3.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    pam_radius-1.4.0-3.3.1
SUSE Linux Enterprise Server for SAP 15 (src):    pam_radius-1.4.0-3.3.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    pam_radius-1.4.0-3.3.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    pam_radius-1.4.0-3.3.1
SUSE Linux Enterprise Server 15-LTSS (src):    pam_radius-1.4.0-3.3.1
SUSE Linux Enterprise Module for Server Applications 15-SP3 (src):    pam_radius-1.4.0-3.3.1
SUSE Linux Enterprise Module for Server Applications 15-SP2 (src):    pam_radius-1.4.0-3.3.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    pam_radius-1.4.0-3.3.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    pam_radius-1.4.0-3.3.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    pam_radius-1.4.0-3.3.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    pam_radius-1.4.0-3.3.1
SUSE Enterprise Storage 6 (src):    pam_radius-1.4.0-3.3.1
SUSE CaaS Platform 4.0 (src):    pam_radius-1.4.0-3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2021-06-12 01:16:47 UTC
openSUSE-SU-2021:0870-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1163933
CVE References: CVE-2015-9542
JIRA References: 
Sources used:
openSUSE Leap 15.2 (src):    pam_radius-1.4.0-lp152.4.3.1
Comment 7 Swamp Workflow Management 2021-07-11 17:05:21 UTC
openSUSE-SU-2021:1896-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1163933
CVE References: CVE-2015-9542
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    pam_radius-1.4.0-3.3.1
Comment 8 Robert Frohl 2022-08-03 09:43:55 UTC
we track this as still missing for:

- SUSE:SLE-11:Update/pam_radius

@Wolfgang: Would be a fix possible there too ?
Comment 15 Wolfgang Engel 2022-11-14 10:29:25 UTC
Resolved -> closing bug.
Comment 16 Carlos López 2022-11-14 10:37:48 UTC
(In reply to Wolfgang Engel from comment #15)
> Resolved -> closing bug.

Please do not close bugs yourself, just reassign to security-team@suse.de. Not all updates have been released yet.