[SECURITY] Fedora 17 Update: freeradius-2.2.0-0.fc17

updates at fedoraproject.org updates at fedoraproject.org
Tue Oct 23 01:50:38 UTC 2012

Fedora Update Notification
2012-10-05 00:34:37

Name        : freeradius
Product     : Fedora 17
Version     : 2.2.0
Release     : 0.fc17
URL         : http://www.freeradius.org/
Summary     : High-performance and highly configurable free RADIUS server
Description :
The FreeRADIUS Server Project is a high performance and highly configurable
GPL'd free RADIUS server. The server is similar in some respects to
Livingston's 2.0 server.  While FreeRADIUS started as a variant of the
Cistron RADIUS server, they don't share a lot in common any more. It now has
many more features than Cistron or Livingston, and is much more configurable.

FreeRADIUS is an Internet authentication daemon, which implements the RADIUS
protocol, as defined in RFC 2865 (and others). It allows Network Access
Servers (NAS boxes) to perform authentication for dial-up users. There are
also RADIUS clients available for Web servers, firewalls, Unix logins, and
more.  Using RADIUS allows authentication and authorization for a network to
be centralized, and minimizes the amount of re-configuration which has to be
done when adding or deleting new users.

Update Information:

This updates to the current upstream 2.2.0 release which is configuration compatible with the prior 2.1.12.

Version 2.2.0 includes a security fix for CVE-2012-3547 Stack-based buffer overflow by processing

This update also includes a fix to prevent .rpmsave and .rpmnew files from being read from the configuration directories.


* Wed Oct  3 2012 John Dennis <jdennis at redhat.com> - 2.2.0-0
- fix CVE-2012-3547 freeradius: Stack-based buffer overflow by processing
- Add new patch to avoid reading .rpmnew, .rpmsave and other invalid
  files when loading config files
- Upgrade to new 2.2.0 upstream release
- Upstream changelog for 2.1.12:
  Feature improvements
  * 100% configuration file compatible with 2.1.x.
    The only fix needed is to disallow "hashsize=0" for rlm_passwd
  * Update Aruba, Alcatel Lucent, APC, BT, PaloAlto, Pureware,
    Redback, and Mikrotik dictionaries
  * Switch to using SHA1 for certificate digests instead of MD5.
    See raddb/certs/*.cnf
  * Added copyright statements to the dictionaries, so that we know
    when people are using them.
  * Better documentation for radrelay and detail file writer.
    See raddb/modules/radrelay and raddb/radrelay.conf
  * Added TLS-Cert-Subject-Alt-Name-Email from patch by Luke Howard
  * Added -F <file> to radwho
  * Added query timeouts to MySQL driver.  Patch from Brian De Wolf.
  * Add /etc/default/freeradius to debian package.
    Patch from Matthew Newton
  * Finalize DHCP and DHCP relay code.  It should now work everywhere.
    See raddb/sites-available/dhcp, src_ipaddr and src_interface.
  * DHCP capabilitiies are now compiled in by default.
    It runs as a DHCP server ONLY when manually enabled.
  * Added one letter expansions: %G - request minute and %I request
  * Added script to convert ISC DHCP lease files to SQL pools.
    See scripts/isc2ippool.pl
  * Added rlm_cache to cache arbitrary attributes.
  * Added max_use to rlm_ldap to force connection to be re-established
    after a given number of queries.
  * Added configtest option to Debian init scripts, and automatic
    config test on restart.
  * Added cache config item to rlm_krb5. When set to "no" ticket
    caching is disabled which may increase performance.

  Bug fixes
  * Fix CVE-2012-3547.  All users of 2.1.10, 2.1.11, 2.1.12,
    and 802.1X should upgrade immediately.
  * Fix typo in detail file writer, to skip writing if the packet
    was read from this detail file.
  * Free cached replies when closing resumed SSL sessions.
  * Fix a number of issues found by Coverity.
  * Fix memory leak and race condition in the EAP-TLS session cache.
    Thanks to Phil Mayers for tracking down OpenSSL APIs.
  * Restrict ATTRIBUTE names to character sets that make sense.
  * Fix EAP-TLS session Id length so that OpenSSL doesn't get
  * Fix SQL IPPool logic for non-timer attributes.  Closes bug #181
  * Change some informational messages to DEBUG rather than error.
  * Portability fixes for FreeBSD.  Closes bug #177
  * A much better fix for the _lt__PROGRAM__LTX_preloaded_symbols
  * Safely handle extremely long lines in conf file variable expansion
  * Fix for Debian bug #606450
  * Mutex lock around rlm_perl Clone routines. Patch from Eike Dehling
  * The passwd module no longer permits "hashsize = 0".  Setting that
    is pointless for a host of reasons.  It will also break the server.
  * Fix proxied inner-tunnel packets sometimes having zero authentication
    vector.  Found by Brian Julin.
  * Added $(EXEEXT) to Makefiles for portability.  Closes bug #188.
  * Fix minor build issue which would cause rlm_eap to be built twice.
  * When using "status_check=request" for a home server, the username
    and password must be specified, or the server will not start.
  * EAP-SIM now calculates keys from the SIM identity, not from the
    EAP-Identity.  Changing the EAP type via NAK may result in
    identities changing.  Bug reported by Microsoft EAP team.
  * Use home server src_ipaddr when sending Status-Server packets
  * Decrypt encrypted ERX attributes in CoA packets.
  * Fix registration of internal xlat's so %{mschap:...} doesn't
    disappear after a HUP.
  * Can now reference tagged attributes in expansions.
    e.g. %{Tunnel-Type:1} and %{Tunnel-Type:1[0]} now work.
  * Correct calculation of Message-Authenticator for CoA and Disconnect
    replies.  Patch from Jouni Malinen
  * Install rad_counter, for managing rlm_counter files.
  * Add unique index constraint to all SQL flavours so that alternate
    queries work correctly.
  * The TTLS diameter decoder is now more lenient.  It ignores
    unknown attributes, instead of rejecting the TTLS session.
  * Use "globfree" in detail file reader.  Prevents very slow leak.
    Closes bug #207.
  * Operator =~ shouldn't copy the attribute, like :=.  It should
    instead behave more like ==.
  * Build main Debian package without SQL dependencies
  * Use max_queue_size in threading code
  * Update permissions in raddb/sql/postgresql/admin.sql
  * Added OpenSSL_add_all_algorithms() to fix issues where OpenSSL
    wouldn't use methods it knew about.
  * Add more sanity checks in dynamic_clients code so the server won't
    crash if it attempts to load a badly formated client definition.
* Thu Aug  9 2012 John Dennis <jdennis at redhat.com> - 2.1.12-6
- rebuilding, hopefully will resolve bug#827858

This update can be installed with the "yum" update program.  Use 
su -c 'yum update freeradius' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at

More information about the package-announce mailing list