Package: freeradius Version: 1.1.0-1.1 Severity: normal Tags: patch Hi,
Attached is the diff for my freeradius 1.1.0-1.2 NMU. I plan to upload shortly. Thanks, -- ----------------------------------------------------------------- | ,''`. Stephen Gran | | : :' : [EMAIL PROTECTED] | | `. `' Debian user, admin, and developer | | `- http://www.debian.org | -----------------------------------------------------------------
diff -Nru /tmp/X4MUTpZG5l/freeradius-1.1.0/debian/changelog /tmp/AXRhRwNWmO/freeradius-1.1.0/debian/changelog --- /tmp/X4MUTpZG5l/freeradius-1.1.0/debian/changelog 2006-05-17 12:54:42.000000000 -0500 +++ /tmp/AXRhRwNWmO/freeradius-1.1.0/debian/changelog 2006-05-17 12:54:43.000000000 -0500 @@ -1,3 +1,14 @@ +freeradius (1.1.0-1.2) unstable; urgency=high + + * Non-maintainer upload. + * [ CVE-2006-1354 ]: + src/modules/rlm_eap/types/rlm_eap_mschapv2/rlm_eap_mschapv2.c: + Due to insufficient input validation it is possible for a remote + attacker to bypass authentication or cause a denial of service. + (closes: #359042) + + -- steve <[EMAIL PROTECTED]> Wed, 17 May 2006 11:22:28 -0500 + freeradius (1.1.0-1.1) unstable; urgency=low * Non-maintainer upload. diff -Nru /tmp/X4MUTpZG5l/freeradius-1.1.0/debian/patches/00list /tmp/AXRhRwNWmO/freeradius-1.1.0/debian/patches/00list --- /tmp/X4MUTpZG5l/freeradius-1.1.0/debian/patches/00list 2006-05-17 12:54:42.000000000 -0500 +++ /tmp/AXRhRwNWmO/freeradius-1.1.0/debian/patches/00list 2006-05-17 12:54:43.000000000 -0500 @@ -4,3 +4,4 @@ 12_more_dialup_admin_various_fixes.dpatch 13_a_libtool14_to_call_your_own.dpatch 14_broken_parse.dpatch +15_CVE-2006-1354.dpatch diff -Nru /tmp/X4MUTpZG5l/freeradius-1.1.0/debian/patches/15_CVE-2006-1354.dpatch /tmp/AXRhRwNWmO/freeradius-1.1.0/debian/patches/15_CVE-2006-1354.dpatch --- /tmp/X4MUTpZG5l/freeradius-1.1.0/debian/patches/15_CVE-2006-1354.dpatch 1969-12-31 18:00:00.000000000 -0600 +++ /tmp/AXRhRwNWmO/freeradius-1.1.0/debian/patches/15_CVE-2006-1354.dpatch 2006-05-17 12:54:43.000000000 -0500 @@ -0,0 +1,23 @@ +#! /bin/sh /usr/share/dpatch/dpatch-run +## 15_CVE-2006-1354.dpatch by <[EMAIL PROTECTED]> +## +## All lines beginning with `## DP:' are a description of the patch. +## DP: MSCHAP vuln + [EMAIL PROTECTED]@ + +--- freeradius-1.1.0/src/modules/rlm_eap/types/rlm_eap_mschapv2/rlm_eap_mschapv2.c.old 2006-05-17 12:41:18.000000000 -0500 ++++ freeradius-1.1.0/src/modules/rlm_eap/types/rlm_eap_mschapv2/rlm_eap_mschapv2.c 2006-05-17 12:41:45.000000000 -0500 +@@ -449,6 +449,12 @@ + break; + + case PW_EAP_MSCHAPV2_SUCCESS: ++ if (data->code != PW_EAP_MSCHAPV2_SUCCESS) { ++ radlog(L_ERR, "rlm_eap_mschapv2: Unexpected success received"); ++ return 0; ++ } ++ ++ + /* + * It's a success. Don't proxy it. + */