[CLSA-2025:1743103421] freeradius: Fix of CVE-2024-3596
Type:
security
Severity:
Critical
Release date:
2025-03-27 19:23:46 UTC
Description:
- CVE-2024-3596: fix chosen-prefix collision attack against MD5 Response Authenticator signature that allowed malicious modification of valid RADIUS responses
Updated packages:
  • freeradius-3.0.21-37.el9_2.tuxcare.els1.x86_64.rpm
    sha:ea767ff2bbb4f8726f973917e53354342d9d8d0a65504d3be47fc7ba1938cdc4
  • freeradius-devel-3.0.21-37.el9_2.tuxcare.els1.x86_64.rpm
    sha:1e324cb901715c63789776b6e47776092906b3c0041cd990d7fce838258f20ad
  • freeradius-doc-3.0.21-37.el9_2.tuxcare.els1.x86_64.rpm
    sha:303d2196d775f0df192f2b0e09c782fe83fd890ee5349028b7c7984a9aa7d000
  • freeradius-krb5-3.0.21-37.el9_2.tuxcare.els1.x86_64.rpm
    sha:0affd2190117e1e746c72647434e74ed561615e2060e8c0357cbfcf93854caee
  • freeradius-ldap-3.0.21-37.el9_2.tuxcare.els1.x86_64.rpm
    sha:909db127efbc7e612a6792f5c4abd693e71ee9006d2eb8cf5464f9f7abedcf2c
  • freeradius-mysql-3.0.21-37.el9_2.tuxcare.els1.x86_64.rpm
    sha:b4724e46377f2b03dfa13958d93b1b04e32b497ff5d76e4ca41302ff8cca26a6
  • freeradius-perl-3.0.21-37.el9_2.tuxcare.els1.x86_64.rpm
    sha:d022741e62955692a539a2365801371f944297b1e7a601d7c37b56baeb114879
  • freeradius-postgresql-3.0.21-37.el9_2.tuxcare.els1.x86_64.rpm
    sha:152476fc30feb4c57158d590ec9688a07943f06320acf0a9237d2ddc80ec610e
  • freeradius-rest-3.0.21-37.el9_2.tuxcare.els1.x86_64.rpm
    sha:bbb501aed2a7c2ffcccbb5d8f530c4a56c24f3e6a360286fceb849ee345cbcb2
  • freeradius-sqlite-3.0.21-37.el9_2.tuxcare.els1.x86_64.rpm
    sha:70051f9af64a85f0b9110da5db7e009e028925b9a85971650be0039a9b86d98e
  • freeradius-unixODBC-3.0.21-37.el9_2.tuxcare.els1.x86_64.rpm
    sha:3b9e83f422a04d20fc7a39da91ee6360adfce9afecb54cb5613e4e5c764f9f70
  • freeradius-utils-3.0.21-37.el9_2.tuxcare.els1.x86_64.rpm
    sha:8f19d120d94f6f8be014b0e471da162c545e5f509442d53300d1de1a5c37ebd5
  • python3-freeradius-3.0.21-37.el9_2.tuxcare.els1.x86_64.rpm
    sha:6bc95043f64d74f97a20bb8075db00ff447e6565f01297550eb9a50d5be2e045
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.