Linux Security
    Linux Security
    Linux Security

    Fedora 30: freeradius FEDORA-2019-17ed521527

    Posted By
    Security fix for CVE-2019-13456
    Fedora Update Notification
    2019-12-01 01:03:32.741944
    Name        : freeradius
    Product     : Fedora 30
    Version     : 3.0.20
    Release     : 1.fc30
    URL         :
    Summary     : High-performance and highly configurable free RADIUS server
    Description :
    The FreeRADIUS Server Project is a high performance and highly configurable
    GPL'd free RADIUS server. The server is similar in some respects to
    Livingston's 2.0 server.  While FreeRADIUS started as a variant of the
    Cistron RADIUS server, they don't share a lot in common any more. It now has
    many more features than Cistron or Livingston, and is much more configurable.
    FreeRADIUS is an Internet authentication daemon, which implements the RADIUS
    protocol, as defined in RFC 2865 (and others). It allows Network Access
    Servers (NAS boxes) to perform authentication for dial-up users. There are
    also RADIUS clients available for Web servers, firewalls, Unix logins, and
    more.  Using RADIUS allows authentication and authorization for a network to
    be centralized, and minimizes the amount of re-configuration which has to be
    done when adding or deleting new users.
    Update Information:
    Security fix for CVE-2019-13456
    * Fri Nov 15 2019 Alexander Scheel  - 3.0.20-1
    - Rebased to 3.0.20
      Resolves: bz#1772710
    - Introduced new rlm_python3 module
    * Thu Jul 25 2019 Fedora Release Engineering  - 3.0.19-5
    - Rebuilt for
    * Fri May 31 2019 Jitka Plesnikova  - 3.0.19-4
    - Perl 5.30 rebuild
    * Wed May  8 2019 Alexander Scheel  - 3.0.19-3
    - Update boostrap to change ownership of all certificates to root:radiusd
    * Wed May  8 2019 Alexander Scheel  - 3.0.19-2
    - Updated crypto-policies patch
    - Updated /etc/raddb/certs/bootstrap to only create certificates if missing: bz#1705165 bz#1672284
    - Updated logrotate definitions to run as radiusd:radiusd: bz#1705343
    - Drop python2 package on Fedora 31+
    - Add database dependencies: bz#1658697
    - Don't generate certificate during build
      [ 1 ] Bug #1737663 - CVE-2019-13456 freeradius: eap-pwd: Information leak due to aborting when needing more than 10 iterations
    This update can be installed with the "dnf" update program. Use
    su -c 'dnf upgrade --advisory FEDORA-2019-17ed521527' at the command
    line. For more information, refer to the dnf documentation available at
    All packages are signed with the Fedora Project GPG key. More details on the
    GPG keys used by the Fedora Project can be found at
    package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
    To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
    Fedora Code of Conduct:
    List Guidelines:
    List Archives: email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"131","title":"Preventing information leakage","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.