USN-3316-1: FreeRADIUS vulnerability
Publication date
7 June 2017
Overview
FreeRADIUS would allow unintended access over the network.
Releases
Packages
- freeradius - high-performance and highly configurable RADIUS server
Details
Stefan Winter and Luboš Pavlíček discovered that FreeRADIUS incorrectly
handled the TLS session cache. A remote attacker could possibly use this
issue to bypass authentication by resuming an unauthenticated session.
Stefan Winter and Luboš Pavlíček discovered that FreeRADIUS incorrectly
handled the TLS session cache. A remote attacker could possibly use this
issue to bypass authentication by resuming an unauthenticated session.
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
17.04 zesty | freeradius – 3.0.12+dfsg-4ubuntu1.1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.