A critical bug in freeradius-2.1.11-r1 (newest unmasked to date) allows to execute arbitrary code on the server.
Created attachment 323580 [details, diff]
Patch to CVE-2012-3547
This patch is insipred by git fix in git://git.freeradius.org/freeradius-server.git , commit 684dce7da5fd078. Works with freeradius-2.1.11-r1.
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS
2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote
attackers to cause a denial of service (server crash) and possibly execute
arbitrary code via a long "not after" timestamp in a client certificate.
Just in case if you want to bump freeradius-2.2.0 in the same time, you need to add the following:
< econf --disable-static --disable-ltdl-install --with-system-libtool \
> econf --disable-static --disable-ltdl-install --with-system-libtool --with-system-libltdl \
It won't compile without the "--with-system-libltdl" option.
Okay I'm going to look into these and most likely fix them with 2.2.0.
2.2.0 is in. You can probably proceed from here, can't be worse than the current stable...
(In reply to comment #5)
> 2.2.0 is in. You can probably proceed from here, can't be worse than the
> current stable...
Arches, please test and mark stable: =net-dialup/freeradius-2.2.0
GLSA draft is ready for review.
This issue was resolved and addressed in
GLSA 201311-09 at http://security.gentoo.org/glsa/glsa-201311-09.xml
by GLSA coordinator Sergey Popov (pinkbyte).