Amazon Linux 1 Security Advisory: ALAS-2012-131
Advisory Release Date: 2012-10-08 10:40 Pacific
Advisory Updated Date: 2014-09-14 17:07 Pacific
A buffer overflow flaw was discovered in the way radiusd handled the expiration date field in X.509 client certificates. A remote attacker could possibly use this flaw to crash radiusd if it were configured to use the certificate or TLS tunnelled authentication methods (such as EAP-TLS, EAP-TTLS, and PEAP). (CVE-2012-3547)
Affected Packages:
freeradius
Issue Correction:
Run yum update freeradius to update your system.
i686:
freeradius-perl-2.1.12-4.11.amzn1.i686
freeradius-utils-2.1.12-4.11.amzn1.i686
freeradius-ldap-2.1.12-4.11.amzn1.i686
freeradius-unixODBC-2.1.12-4.11.amzn1.i686
freeradius-postgresql-2.1.12-4.11.amzn1.i686
freeradius-python-2.1.12-4.11.amzn1.i686
freeradius-mysql-2.1.12-4.11.amzn1.i686
freeradius-2.1.12-4.11.amzn1.i686
freeradius-krb5-2.1.12-4.11.amzn1.i686
freeradius-debuginfo-2.1.12-4.11.amzn1.i686
src:
freeradius-2.1.12-4.11.amzn1.src
x86_64:
freeradius-postgresql-2.1.12-4.11.amzn1.x86_64
freeradius-mysql-2.1.12-4.11.amzn1.x86_64
freeradius-ldap-2.1.12-4.11.amzn1.x86_64
freeradius-debuginfo-2.1.12-4.11.amzn1.x86_64
freeradius-unixODBC-2.1.12-4.11.amzn1.x86_64
freeradius-utils-2.1.12-4.11.amzn1.x86_64
freeradius-perl-2.1.12-4.11.amzn1.x86_64
freeradius-krb5-2.1.12-4.11.amzn1.x86_64
freeradius-python-2.1.12-4.11.amzn1.x86_64
freeradius-2.1.12-4.11.amzn1.x86_64