File _patchinfo of Package patchinfo.7382

<patchinfo incident="7382">
  <issue id="1049086" tracker="bnc">VUL-0: CVE-2017-10978: freeradius-server: Multiple security issues found with fuzzer</issue>
  <issue id="2017-10978" tracker="cve" />
  <issue id="2017-10987" tracker="cve" />
  <issue id="2017-10986" tracker="cve" />
  <issue id="2017-10985" tracker="cve" />
  <issue id="2017-10984" tracker="cve" />
  <issue id="2017-10983" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>adamm</packager>
  <description>
  
This update for freeradius-server fixes the following issues:

Fix a number of security issues found via fuzzing by Guido Vranken
See http://freeradius.org/security/fuzzer-2017.html for details.
(boo#1049086)

- CVE-2017-10987 / FR-GV-304: DHCP - Buffer over-read in fr_dhcp_decode_suboptions()
- CVE-2017-10986 / FR-GV-303: DHCP - Infinite read in dhcp_attr2vp()
- FR-AD-001: Use strncmp() instead of memcmp() for string data
- CVE-2017-10983 / FR-GV-206: DHCP - Read overflow when decoding option 63
- CVE-2017-10985 / FR-GV-302: Infinite loop and memory exhaustion with 'concat' attributes 
- CVE-2017-10984 / FR-GV-301: Write overflow in data2vp_wimax()
- FR-AD-002: String lifetime issues in rlm_python
- FR-GV-305: Decode 'signed' attributes correctly
- CVE-2017-10978 / FR-GV-201: Read / write overflow in make_secret()
</description>
  <summary>Security update for freeradius-server</summary>
</patchinfo>
openSUSE Build Service is sponsored by