Ubuntu Security Notice 3316-1 - Stefan Winter and Lubos Pavlicek discovered that FreeRADIUS incorrectly handled the TLS session cache. A remote attacker could possibly use this issue to bypass authentication by resuming an unauthenticated session.
095195c45fa27a9a6c3e00820edba58d36e88390c73d39c422476dfce9054aca
===========================================================================
Ubuntu Security Notice USN-3316-1
June 07, 2017
freeradius vulnerability
===========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
Summary:
FreeRADIUS would allow unintended access over the network.
Software Description:
- freeradius: high-performance and highly configurable RADIUS server
Details:
Stefan Winter and Lubos Pavlicek discovered that FreeRADIUS incorrectly
handled the TLS session cache. A remote attacker could possibly use this
issue to bypass authentication by resuming an unauthenticated session.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
freeradius 3.0.12+dfsg-4ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3316-1
CVE-2017-9148
Package Information:
https://launchpad.net/ubuntu/+source/freeradius/3.0.12+dfsg-4ubuntu1.1
--kJJBKf5sux2h72dRqcBcUSLqreFWrHC2F--