USN-3316-1: FreeRADIUS vulnerability
7 June 2017
FreeRADIUS would allow unintended access over the network.
Releases
Packages
- freeradius - high-performance and highly configurable RADIUS server
Details
Stefan Winter and Luboš Pavlíček discovered that FreeRADIUS incorrectly
handled the TLS session cache. A remote attacker could possibly use this
issue to bypass authentication by resuming an unauthenticated session.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 17.04
In general, a standard system update will make all the necessary changes.