Skip to navigation

Bug Fix Advisory freeradius2 bug fix and enhancement update

Advisory: RHBA-2012:0196-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)

Details

Updated freeradius2 packages that fix several bugs and add an enhancement are
now available for Red Hat Enterprise Linux 5.

FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS)
server which allows RADIUS clients to perform authentication against the RADIUS
server. The RADIUS server may optionally perform accounting of its operations
via the RADIUS protocol.

The freeradius2 packages have been upgraded to upstream version 2.1.12, which
provides a number of bug fixes and enhancements over the previous version.
(BZ#609633)

These updated freeradius2 packages provide fixes for the following bugs:

* The documentation of command-line arguments was incomplete and in some cases
erroneous; some commands did not have a man page. The man pages and help output
were updated to correct these deficiencies. (BZ#546583)

* Previously, freeradius2 did not respect the core dump configuration flag.
Consequently, the radiusd process did not produce a core dump file when it
terminated unexpectedly with a segmentation fault. With this update the problem
has been fixed, and now if radiusd aborts, a core dump is now generated if the
core dump flag is enabled. (BZ#602567)

* The freeradius-pam-conf configuration file, /etc/pam.d/radiusd, referenced a
non-existent pam configuration "password-auth". This has been fixed to refer to
"system-auth". (BZ#658508)

* The previous version of freeradius generated its temporary SSL certificates
the first time the server was run with the "-X" debug flag. Now the temporary
certificates are created the first time the freeradius RPM is installed. It is
no longer necessary to run the server in debug mode to create the initial
certificates. (BZ#756442)

* The radtest command-line argument to request the PPP hint option was not
parsed correctly. Consequently, radclient did not add the PPP hint to the
request packet and the test failed. This update corrects the problem and radtest
now functions as expected. (BZ#760193)

In addition, these updated freeradius2 packages provide the following
enhancement:

* The radtest tool did not send a Message-Authenticator by default in an
Access-Request. Consequently, radtest could not connect to a RADIUS server if it
required the authenticator as per RFC 5080. With this update the problem has
been fixed, and now the Message-Authenticator is always sent. (BZ#630072)

Users are advised to upgrade to these updated freeradius2 packages, which fix
these bugs and add this enhancement.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
freeradius2-2.1.12-3.el5.src.rpm
File outdated by:  RHSA-2013:0134
    MD5: ee90f3fc7cee2b18826020b44d08613c
SHA-256: 76bc0f11444ff218214dea01ba8f4a1ea825e45e753f1c88b30d1f792fbcf9aa
 
IA-32:
freeradius2-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: 31e84fcad3da1056feba0b68406960f0
SHA-256: 5ec2354b281d27e03a40f6cc319c6dc356eaab5028c65c73fb40308aa8ba1c4f
freeradius2-krb5-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: 26ead1a2fbc28654d9411a7bb4eb2c4f
SHA-256: dcf76f91be28e4744de542b763b33bd6b08f6c4639d7fdfd8f1d00288c832682
freeradius2-ldap-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: 528deebf460c0e94844d682b48a78b0d
SHA-256: 24ff10ef758b69cac089b2366e18e4df5a524d89788eab01c6ae5eca1d06bed2
freeradius2-mysql-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: 45998d9b044a62d60e5e17f00a5a619b
SHA-256: 158d1649e0b4f535832bb1d22d1bf262729aaf73980a3f3f09b5a37aa08ca558
freeradius2-perl-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: dd0726a1a8ff8496393743007360236e
SHA-256: fdcb06505bfaca9bebfb49b7802a49726da451f3b7a722a9a2a4094d66105882
freeradius2-postgresql-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: c9a6febcb22deae900a6c1cd031d9d13
SHA-256: e4b76f33ae9aaaa7b04c70019f5c7cdff9c32e5b0a4cb53310467483797b86f3
freeradius2-python-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: 2062e841939cbe4ef25fa2c8233e347e
SHA-256: 17877f22438f89d47660419fe2aebe1bef1ef30c54a4401bde49a5203d99bd27
freeradius2-unixODBC-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: bfc86b6c0f6de30cf7f267fd330e201b
SHA-256: 313827db02b4750e24089d83d8c72853c416f7688e7d4f337405d895d67a2a18
freeradius2-utils-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: c9803a24a6b7e766f85f6a26aa157b93
SHA-256: b752d477a141976171a1ac92263ed5e4f0632b694cefaa8ff175183721315d41
 
x86_64:
freeradius2-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: e0822450b53687f441f45c31364d5a03
SHA-256: fe35932ff04ed70eaf9a8a0618d9b428b4accd861bacdcbd22888aa143102f85
freeradius2-krb5-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 07d4050a3a6927c138882011b9654e39
SHA-256: 6c7c5d8c2acf30a7b0c3d4a7fdc9e0a487a80479e72369fa5c51a6009f56d803
freeradius2-ldap-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 55ce54f200f75e6e0da2770902ea4cd1
SHA-256: b7ef3469f4286bd7aeaaee069bffb312fdba9a05ff1b2c464c5fafcb9beb03cc
freeradius2-mysql-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 93fc69e774dc083310aa914f781f449b
SHA-256: 58996aacf7ea1c739f2df4e323ed869d61389898b03af73c34d3eb808356deb2
freeradius2-perl-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: d72a3aa8fd67c979e4d058ab5f1a3bb5
SHA-256: 1d0965cc50d3504f7e3391b5ed2901cef39034e187aabc68fede0b09d6bb9f81
freeradius2-postgresql-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 11a6fbfab3a952d1ceda99a89dc807c2
SHA-256: 90724722080a9eb03e350a6b88a126257b2026f9f2098497b4e0d5222cefd53e
freeradius2-python-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 9dc4a949dfdfe828983bd0a781ca299e
SHA-256: 61c15aa452c0ffeefa4b9c6195e3e15798707d4459ce5d81fd1abb279074b6b2
freeradius2-unixODBC-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 45f685c251bc7e18289d0fa126009970
SHA-256: 4a8daf26dbbb87b2e729fb5418cea9157c9d9cba85e75244a49f5aff9f94484c
freeradius2-utils-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 7c9dbdd0063b646b2c4a58a009d56e94
SHA-256: 84ad62746a1109896766429ad263d9eb3f01fe70e3c6698c896b72ca6ce2bf8e
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
freeradius2-2.1.12-3.el5.src.rpm
File outdated by:  RHSA-2013:0134
    MD5: ee90f3fc7cee2b18826020b44d08613c
SHA-256: 76bc0f11444ff218214dea01ba8f4a1ea825e45e753f1c88b30d1f792fbcf9aa
 
IA-32:
freeradius2-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: 31e84fcad3da1056feba0b68406960f0
SHA-256: 5ec2354b281d27e03a40f6cc319c6dc356eaab5028c65c73fb40308aa8ba1c4f
freeradius2-krb5-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: 26ead1a2fbc28654d9411a7bb4eb2c4f
SHA-256: dcf76f91be28e4744de542b763b33bd6b08f6c4639d7fdfd8f1d00288c832682
freeradius2-ldap-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: 528deebf460c0e94844d682b48a78b0d
SHA-256: 24ff10ef758b69cac089b2366e18e4df5a524d89788eab01c6ae5eca1d06bed2
freeradius2-mysql-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: 45998d9b044a62d60e5e17f00a5a619b
SHA-256: 158d1649e0b4f535832bb1d22d1bf262729aaf73980a3f3f09b5a37aa08ca558
freeradius2-perl-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: dd0726a1a8ff8496393743007360236e
SHA-256: fdcb06505bfaca9bebfb49b7802a49726da451f3b7a722a9a2a4094d66105882
freeradius2-postgresql-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: c9a6febcb22deae900a6c1cd031d9d13
SHA-256: e4b76f33ae9aaaa7b04c70019f5c7cdff9c32e5b0a4cb53310467483797b86f3
freeradius2-python-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: 2062e841939cbe4ef25fa2c8233e347e
SHA-256: 17877f22438f89d47660419fe2aebe1bef1ef30c54a4401bde49a5203d99bd27
freeradius2-unixODBC-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: bfc86b6c0f6de30cf7f267fd330e201b
SHA-256: 313827db02b4750e24089d83d8c72853c416f7688e7d4f337405d895d67a2a18
freeradius2-utils-2.1.12-3.el5.i386.rpm
File outdated by:  RHSA-2013:0134
    MD5: c9803a24a6b7e766f85f6a26aa157b93
SHA-256: b752d477a141976171a1ac92263ed5e4f0632b694cefaa8ff175183721315d41
 
IA-64:
freeradius2-2.1.12-3.el5.ia64.rpm
File outdated by:  RHSA-2013:0134
    MD5: c52852de49081cbdee711f4ce11c01b6
SHA-256: 92d38c3252743df01b849e424e2b01e4f1196d657109b3b840141dee6f6e7d57
freeradius2-krb5-2.1.12-3.el5.ia64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 6122078868932045a1fbd365de692bac
SHA-256: 2fefcb107ea567b0338c103e10df39178911a50aa23c34841ce248b0d15b5b4c
freeradius2-ldap-2.1.12-3.el5.ia64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 78f9c30062e10d7a47ed06b47f7c20c0
SHA-256: 37ded1c6abeea5583fcc595ebe6b14796fcf27eed4404a51b72baef8f91b9b13
freeradius2-mysql-2.1.12-3.el5.ia64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 7405363541a54b6824efe1dd0d8e5b98
SHA-256: 7586e93d7190f38e5d8f8f842754f56cf45f1cce301e55435b67621e69bbf629
freeradius2-perl-2.1.12-3.el5.ia64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 714b6ab2bb079f102119c28d580be3b6
SHA-256: 34d248fc8f6df7e50b7d53558fa5e67943fe7f4bf892850fbbe0210dad889c64
freeradius2-postgresql-2.1.12-3.el5.ia64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 190fb418ce9b4cd356fe7318b76ec5e7
SHA-256: e58fe56a2d6b1329452b572664d2cad2f9b51fb608adc350070d3cdd2d71e2f6
freeradius2-python-2.1.12-3.el5.ia64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 55bc630fe8563d844412790543c52f67
SHA-256: e6c84cf3b699f2a59a0c16708c3f083bf3092a8bcb09f5434aa85e1cb13d25cf
freeradius2-unixODBC-2.1.12-3.el5.ia64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 64b74f69390c2bd5370abf500d2d72ae
SHA-256: fa5dc829b9e0aceeb7c040e350271913bdf01c3fcd96a5eb701aa5533f498576
freeradius2-utils-2.1.12-3.el5.ia64.rpm
File outdated by:  RHSA-2013:0134
    MD5: e7d425661f5b37673f9602d2bdc6ec49
SHA-256: 814337625469bed884e8cb0ed5864e871502615cf04fd81e54bd527949dfd393
 
PPC:
freeradius2-2.1.12-3.el5.ppc.rpm
File outdated by:  RHSA-2013:0134
    MD5: 4a2424039c70adb46131197acd8512b7
SHA-256: 2cb3706d3e351268b9fdaeac44e500841d1c04bb38bf7e61dd00bbc62e886f15
freeradius2-krb5-2.1.12-3.el5.ppc.rpm
File outdated by:  RHSA-2013:0134
    MD5: 8962e0e66fbddc8491bb2419544639d6
SHA-256: 6c0a4c854f411cb2a257b4c0fa17f7de57806321f0c9304756e78795bbb24f4b
freeradius2-ldap-2.1.12-3.el5.ppc.rpm
File outdated by:  RHSA-2013:0134
    MD5: bac379a4cd72709aa210bb75ed842cf2
SHA-256: 3ea8e23e2043e81f8b11e5786ef776fafc84bb412f520f8cd75cfb702c51bbcd
freeradius2-mysql-2.1.12-3.el5.ppc.rpm
File outdated by:  RHSA-2013:0134
    MD5: a6f115b71bb1e2b19cbd44788aece095
SHA-256: 57154c99078deb1db269b2e017db1289aff2e0e7c6940ee5bcae27419ff5d1c1
freeradius2-perl-2.1.12-3.el5.ppc.rpm
File outdated by:  RHSA-2013:0134
    MD5: 4b010226aaef159f47a6a7ae2b2045d5
SHA-256: b98cb417433952486617a3b69d56aacedadc02eed6f60fc07f89713585bae768
freeradius2-postgresql-2.1.12-3.el5.ppc.rpm
File outdated by:  RHSA-2013:0134
    MD5: 01bf2005bffe4b4e6c4e894e80a403b0
SHA-256: b50a0a1bf94ee9210979a448f81bb28767f96a876adb51d04f242bd3e3f42257
freeradius2-python-2.1.12-3.el5.ppc.rpm
File outdated by:  RHSA-2013:0134
    MD5: 52e0607cd6d2bdcc2bb6dc05ed991a4c
SHA-256: 940f1146805f523e69824d40adc2a2c66eda670c02fb873153b6bb7dbed3793e
freeradius2-unixODBC-2.1.12-3.el5.ppc.rpm
File outdated by:  RHSA-2013:0134
    MD5: 39fa1d31aa0d91d973d454d0df4e0873
SHA-256: fe817deff859f55d92c67a7ff7eaa42d041d55cf2957802a709bd872d0905ec1
freeradius2-utils-2.1.12-3.el5.ppc.rpm
File outdated by:  RHSA-2013:0134
    MD5: 75718ce9d2a74aa79f7bfd7e102550b4
SHA-256: ea0224858a3365805e7e620308b00a7512931d4108a460fb88d9f449f1879f8d
 
s390x:
freeradius2-2.1.12-3.el5.s390x.rpm
File outdated by:  RHSA-2013:0134
    MD5: 4c3a07f759e4c75e270a73b006588f7f
SHA-256: ca284708c6fc72612d67a8bd8a71513567d0a158579255d3141bead68e0a815a
freeradius2-krb5-2.1.12-3.el5.s390x.rpm
File outdated by:  RHSA-2013:0134
    MD5: cc3ef2e61fa38792701c6dd4db2cb949
SHA-256: b8e267188c365ddfe2525ff2bc80a0bf56c7b34b8ab0d675d99313b4f99a84af
freeradius2-ldap-2.1.12-3.el5.s390x.rpm
File outdated by:  RHSA-2013:0134
    MD5: 017daf90d33d24952e95394c74879ff6
SHA-256: 5652ef87ebe18749884f8df8fbcfe77327edc2645aa8582ea03de9e071f186b0
freeradius2-mysql-2.1.12-3.el5.s390x.rpm
File outdated by:  RHSA-2013:0134
    MD5: 3595642f9cde22b4d1642ea428726b5b
SHA-256: b3024ca85267235041a55c14f207c7ff00d0fb514a33f3bd20991bbf2339cf93
freeradius2-perl-2.1.12-3.el5.s390x.rpm
File outdated by:  RHSA-2013:0134
    MD5: dca428c681a7500a42e8407387b5c297
SHA-256: 1942dcdbf5746acc2de3f60a4ba7701d7246303f18f5f6cea49a515025132a3c
freeradius2-postgresql-2.1.12-3.el5.s390x.rpm
File outdated by:  RHSA-2013:0134
    MD5: 134d14df347810c1e176ee5912931d45
SHA-256: 3736cedc510c4ddf6327d3dae9a6dbbb93369fac3f73a2ca7eb3a30a5b160e80
freeradius2-python-2.1.12-3.el5.s390x.rpm
File outdated by:  RHSA-2013:0134
    MD5: e2b3f4f0203744a152ae90529d2002a6
SHA-256: 37ba9430f956dbffeac266124019a13b8432ff24bb2e517cb527f5c5f5644795
freeradius2-unixODBC-2.1.12-3.el5.s390x.rpm
File outdated by:  RHSA-2013:0134
    MD5: a28295ab75e4870228d2d250c84d805b
SHA-256: 6127633b67588597ba76800398488167d9c1d999e63b54f88ff93b11b2491453
freeradius2-utils-2.1.12-3.el5.s390x.rpm
File outdated by:  RHSA-2013:0134
    MD5: 1ebb7e742ae0f233b6add135eef71f27
SHA-256: de8fa58efcad30c3500c1cd3c9f917f4c17be214f18389f9af3f9d3e89f96094
 
x86_64:
freeradius2-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: e0822450b53687f441f45c31364d5a03
SHA-256: fe35932ff04ed70eaf9a8a0618d9b428b4accd861bacdcbd22888aa143102f85
freeradius2-krb5-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 07d4050a3a6927c138882011b9654e39
SHA-256: 6c7c5d8c2acf30a7b0c3d4a7fdc9e0a487a80479e72369fa5c51a6009f56d803
freeradius2-ldap-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 55ce54f200f75e6e0da2770902ea4cd1
SHA-256: b7ef3469f4286bd7aeaaee069bffb312fdba9a05ff1b2c464c5fafcb9beb03cc
freeradius2-mysql-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 93fc69e774dc083310aa914f781f449b
SHA-256: 58996aacf7ea1c739f2df4e323ed869d61389898b03af73c34d3eb808356deb2
freeradius2-perl-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: d72a3aa8fd67c979e4d058ab5f1a3bb5
SHA-256: 1d0965cc50d3504f7e3391b5ed2901cef39034e187aabc68fede0b09d6bb9f81
freeradius2-postgresql-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 11a6fbfab3a952d1ceda99a89dc807c2
SHA-256: 90724722080a9eb03e350a6b88a126257b2026f9f2098497b4e0d5222cefd53e
freeradius2-python-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 9dc4a949dfdfe828983bd0a781ca299e
SHA-256: 61c15aa452c0ffeefa4b9c6195e3e15798707d4459ce5d81fd1abb279074b6b2
freeradius2-unixODBC-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 45f685c251bc7e18289d0fa126009970
SHA-256: 4a8daf26dbbb87b2e729fb5418cea9157c9d9cba85e75244a49f5aff9f94484c
freeradius2-utils-2.1.12-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0134
    MD5: 7c9dbdd0063b646b2c4a58a009d56e94
SHA-256: 84ad62746a1109896766429ad263d9eb3f01fe70e3c6698c896b72ca6ce2bf8e
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

546583 - Executables from freeradius package have incomplete usage help and manpages
602567 - Current version does not generate core dumps
609633 - Rebase to latest RADIUS release
658508 - /etc/pam.d/radiusd uses non-existent password-auth module instead of system-auth
756442 - radiusd doesn't generate certificates
760193 - radtest PPPhint option is not parsed properly


Keywords

freeradius


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/