From Mageia wiki
Jump to: navigation, search

MGASA-2013-0026

Date: February 6th, 2013
Affected releases: 2
Media: Core


Description:
Updated freeradius packages fix security vulnerability:

It was found that the "unix" module ignored the password expiration
setting in "/etc/shadow". If FreeRADIUS was configured to use this module
for user authentication, this flaw could allow users with an expired
password to successfully authenticate, even though their access should
have been denied (CVE-2011-4966).


Updated Packages:
i586:
freeradius-2.1.12-8.2.mga2.i586.rpm
freeradius-krb5-2.1.12-8.2.mga2.i586.rpm
freeradius-ldap-2.1.12-8.2.mga2.i586.rpm
freeradius-mysql-2.1.12-8.2.mga2.i586.rpm
freeradius-postgresql-2.1.12-8.2.mga2.i586.rpm
freeradius-sqlite-2.1.12-8.2.mga2.i586.rpm
freeradius-unixODBC-2.1.12-8.2.mga2.i586.rpm
freeradius-web-2.1.12-8.2.mga2.i586.rpm
libfreeradius1-2.1.12-8.2.mga2.i586.rpm
libfreeradius-devel-2.1.12-8.2.mga2.i586.rpm
freeradius-debug-2.1.12-8.2.mga2.i586.rpm

x86_64:
freeradius-2.1.12-8.2.mga2.x86_64.rpm
freeradius-krb5-2.1.12-8.2.mga2.x86_64.rpm
freeradius-ldap-2.1.12-8.2.mga2.x86_64.rpm
freeradius-mysql-2.1.12-8.2.mga2.x86_64.rpm
freeradius-postgresql-2.1.12-8.2.mga2.x86_64.rpm
freeradius-sqlite-2.1.12-8.2.mga2.x86_64.rpm
freeradius-unixODBC-2.1.12-8.2.mga2.x86_64.rpm
freeradius-web-2.1.12-8.2.mga2.x86_64.rpm
lib64freeradius1-2.1.12-8.2.mga2.x86_64.rpm
lib64freeradius-devel-2.1.12-8.2.mga2.x86_64.rpm
freeradius-debug-2.1.12-8.2.mga2.x86_64.rpm

SRPMS:
freeradius-2.1.12-8.2.mga2.src.rpm


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4966
https://rhn.redhat.com/errata/RHSA-2013-0134.html
https://bugs.mageia.org/show_bug.cgi?id=8726