Name: | freeradius |
Version: | 3.0.13 |
Release: | 8.0.1.el7_4 |
Architecture: | x86_64 |
Group: | System Environment/Daemons |
Size: | 3704522 |
License: | GPLv2+ and LGPLv2+ |
RPM: |
freeradius-3.0.13-8.0.1.el7_4.x86_64.rpm
|
Source RPM: |
freeradius-3.0.13-8.0.1.el7_4.src.rpm
|
Build Date: | Sat Feb 24 2018 |
Build Host: | x86-ol7-builder-01.us.oracle.com |
Vendor: | Oracle America |
URL: | http://www.freeradius.org/ |
Summary: | High-performance and highly configurable free RADIUS server |
Description: | The FreeRADIUS Server Project is a high performance and highly configurable
GPL'd free RADIUS server. The server is similar in some respects to
Livingston's 2.0 server. While FreeRADIUS started as a variant of the
Cistron RADIUS server, they don't share a lot in common any more. It now has
many more features than Cistron or Livingston, and is much more configurable.
FreeRADIUS is an Internet authentication daemon, which implements the RADIUS
protocol, as defined in RFC 2865 (and others). It allows Network Access
Servers (NAS boxes) to perform authentication for dial-up users. There are
also RADIUS clients available for Web servers, firewalls, Unix logins, and
more. Using RADIUS allows authentication and authorization for a network to
be centralized, and minimizes the amount of re-configuration which has to be
done when adding or deleting new users. |
-
Sat Feb 24 2018 Livy Ge <livy.ge@oracle.com> - 3.0.13-8.0.1
- rebuild with ol7.5
-
Mon Jul 17 2017 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> - 3.0.13-8
- Avoid misinterpreting zero-size malloc in data2vp_extended() fix.
- Related: Bug#1469414 CVE-2017-10984 freeradius: Out-of-bounds write in
data2vp_wimax()
-
Tue Jul 11 2017 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> - 3.0.13-7
- Resolves: Bug#1469409 CVE-2017-10978 freeradius: Out-of-bounds read/write due
to improper output buffer size check in make_secret()
- Resolves: Bug#1469413 CVE-2017-10983 freeradius: Out-of-bounds read in
fr_dhcp_decode() when decoding option 63
- Resolves: Bug#1469414 CVE-2017-10984 freeradius: Out-of-bounds write in
data2vp_wimax()
- Resolves: Bug#1469417 CVE-2017-10985 freeradius: Infinite loop and memory
exhaustion with 'concat' attributes
- Resolves: Bug#1469418 CVE-2017-10986 freeradius: Infinite read in
dhcp_attr2vp()
- Resolves: Bug#1469421 CVE-2017-10987 freeradius: Buffer over-read in
fr_dhcp_decode_suboptions()
-
Thu Jun 15 2017 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> - 3.0.13-6
- Avoid race condition when creating session cache file
Resolves: Bug#1458746 CVE-2017-9148 freeradius: TLS resumption
authentication bypass
-
Tue Jun 06 2017 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> - 3.0.13-5
- Refer to correct package version in configuration comments for Bug#1458746
(CVE-2017-9148) fix.
Related: Bug#1458746 CVE-2017-9148 freeradius: TLS resumption
authentication bypass
-
Tue Jun 06 2017 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> - 3.0.13-4
- Disable internal OpenSSL cache.
Resolves: Bug#1458746 CVE-2017-9148 freeradius: TLS resumption
authentication bypass
- Check sizeof(*packet), not sizeof(packet) in EAP-PWD
Resolves: Bug#1459073 Potential buffer overflow in FreeRADIUS EAP-PWD
- Parse port as well as address for dhcpclient destination
Resolves: Bug#1457825 dhcpclient does no accept IP:PORT
-
Wed Mar 29 2017 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> - 3.0.13-3
- Explicitly disable rlm_cache_memcached to avoid error when the module's
dependencies are installed, and it is built, but not packaged.
Related: Bug#1202751 Rebase FreeRADIUS to 3.0.12 or later minor release
- Prevent segfaults by adding a missing handling of connection errors in
rlm_ldap.
Resolves: Bug#1437409 [abrt] freeradius: radiusd killed by SIGSEGV
- Make radtest use Cleartext-Password for EAP, fixing its support for eap-md5.
Resolves: Bug#1436619 radtest does not work with eap-md5
-
Thu Mar 23 2017 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> - 3.0.13-2
- Fix some issues found with static analyzers.
Resolves: Bug#1432103 FreeRADIUS fails covscan checks
- Revert rlm_eap_tnc removal, because the tncfhh package is still in RHEL.
Related: Bug#1202751 Rebase FreeRADIUS to 3.0.12 or later minor release
-
Tue Mar 07 2017 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> - 3.0.13-1
- Upgrade to upstream v3.0.13 release.
See upstream ChangeLog for details (in freeradius-doc subpackage).
Related: Bug#1202751 Rebase FreeRADIUS to 3.0.12 or later minor release
Resolves: Bug#1329181 freeradius-python fix libpython2.7.so dependency at
compile time
Resolves: Bug#1425869 Radiusd does not trigger modules.sql.fail trap if it
can't connect to mysql server
Resolves: Bug#1427829 Stack overflow when passing bare IPv6 to radclient
-
Tue Feb 21 2017 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> - 3.0.12-2
- Do not fail logrotate if radiusd is not running.
Resolves: Bug#1365226 error running non-shared postrotate script for
/var/log/radius/radius.log of
'/var/log/radius/radius.log '
- Fix output to log file specified with -l option.
Resolves: Bug#1421207 radiusd does not work with log file specified by -l
option
- Fix long hostnames interpreted as IP addresses.
Resolves: Bug#1420359 radclient does not detect 4. level and higher domain
name as a domain name
- Avoid clashes with libtool library symbols.
Resolves: Bug#1391960 undefined symbol: get_vtable in
/usr/lib64/libtdsodbc.so.0 with freeradius-unixODBC
- Remove mentions of Auth-Type = System from docs.
Resolves: Bug#1420293 Freeradius does not know Auth-Type = System
- Improve ip/v4/v6/addr documentation.
Resolves: Bug#1179736 add description for ipaddr = hostname from DNS with A
and AAAA entries