drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Rechteprüfung in FreeRADIUS
Name: |
Mangelnde Rechteprüfung in FreeRADIUS |
|
ID: |
FEDORA-2017-e698bba980 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 25 |
|
Datum: |
Fr, 9. Juni 2017, 14:04 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9148 |
|
Applikationen: |
FreeRADIUS |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2017-e698bba980 2017-06-09 03:05:23.560626 ------------------------------------------------------------------------------- -
Name : freeradius Product : Fedora 25 Version : 3.0.14 Release : 1.fc25 URL : http://www.freeradius.org/ Summary : High-performance and highly configurable free RADIUS server Description : The FreeRADIUS Server Project is a high performance and highly configurable GPL'd free RADIUS server. The server is similar in some respects to Livingston's 2.0 server. While FreeRADIUS started as a variant of the Cistron RADIUS server, they don't share a lot in common any more. It now has many more features than Cistron or Livingston, and is much more configurable.
FreeRADIUS is an Internet authentication daemon, which implements the RADIUS protocol, as defined in RFC 2865 (and others). It allows Network Access Servers (NAS boxes) to perform authentication for dial-up users. There are also RADIUS clients available for Web servers, firewalls, Unix logins, and more. Using RADIUS allows authentication and authorization for a network to be centralized, and minimizes the amount of re-configuration which has to be done when adding or deleting new users.
------------------------------------------------------------------------------- - Update Information:
Upgrade FreeRADIUS to upstream v3.0.14 release. The release includes fixes for various issues, including security issues, one of which is CVE-2017-9148. ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1456698 - CVE-2017-9148 freeradius: TLS resumption authentication bypass [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1456698 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade freeradius' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
|
|
|
|