Marked for autoremoval on 30 November: #1084635high
Version 3.2.5+dfsg-3 of freeradius is marked for autoremoval from testing on Sat 30 Nov 2024. It is affected by #1084635. You should try to prevent the removal by fixing these RC bugs.
The current maintainer is looking for someone who can help with
the maintenance of this package. If you are interested in this
package, please consider helping out. One way you can help is
offer to be a co-maintainer or triage bugs in the BTS. Please see bug number #933376 for more information.
1 issue left for the package maintainer to handle:
CVE-2024-3596:
(needs triaging)
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Among the 9 debian patches
available in version 3.2.5+dfsg-3 of the package,
we noticed the following issues:
3 patches
where the metadata indicates that the patch has not yet been forwarded
upstream. You should either forward the patch upstream or update the
metadata to document its real status.
Standards version of the package is outdated.
wishlist
The package should be updated to follow the last version of Debian Policy
(Standards-Version 4.7.0 instead of
4.6.2).
testing migrations
This package will soon be part of the auto-openldap transition. You might want to ensure that your package is ready for it.
You can probably find supplementary information in the
debian-release
archives or in the corresponding
release.debian.org
bug.