Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc
Stevens, and Adam Suhl discovered that FreeRADIUS incorrectly authenticated
certain responses. An attacker able to intercept communications between a
RADIUS client and server could possibly use this issue to forge responses,
bypass authentication, and access network devices and services.
This update introduces new configuration options called “limit_proxy_state”
and “require_message_authenticator” that default to “auto” but should be
set to “yes” once all RADIUS devices have been upgraded on a network.
More Stories
USN-7053-1: ImageMagick vulnerabilities
It was discovered that ImageMagick incorrectly handled certain malformed image files. If a user or automated system using ImageMagick were...
USN-7054-1: unzip vulnerability
It was discovered that unzip did not properly handle unicode strings under certain circumstances. If a user were tricked into...
mosquitto-2.0.19-1.fc39
FEDORA-2024-f71b7dad10 Packages in this update: mosquitto-2.0.19-1.fc39 Update description: Update to 2.0.19 Read More
mosquitto-2.0.19-1.fc40
FEDORA-2024-e36b567b66 Packages in this update: mosquitto-2.0.19-1.fc40 Update description: Update to 2.0.19 Read More
mosquitto-2.0.19-1.fc41
FEDORA-2024-0078a55acf Packages in this update: mosquitto-2.0.19-1.fc41 Update description: Update to 2.0.19 Fix FTBFS (closes rhbz#2300978) Read More
USN-7021-4: Linux kernel vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This...