Your message dated Sat, 15 Nov 2025 11:21:45 +0000 with message-id <736c7150dc08501cc89945035c406eaf9688e144.camel@adam-barratt.org.uk> and subject line Closing requests for updates included in 13.2 has caused the Debian Bug report #1119085, regarding trixie-pu: package openvpn-auth-radius/2.1-9+deb13u1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1119085: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1119085 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: trixie-pu: package openvpn-auth-radius/2.1-9+deb13u1
- From: Samuel Thibault <sthibault@debian.org>
- Date: Sun, 26 Oct 2025 18:39:38 +0100
- Message-id: <aP5c2rS0SGeA8eaD@begin>
Package: release.debian.org Severity: normal Tags: trixie X-Debbugs-Cc: openvpn-auth-radius@packages.debian.org Control: affects -1 + src:openvpn-auth-radius User: release.debian.org@packages.debian.org Usertags: pu Hello, I have uploaded openvpn-auth-radius 2.1-9+deb13u1 for inclusion in trixie. Samuel [ Reason ] As reported on #1118479, the version in trixie of openvpn-auth-radius introduced a use-after-free, which in a hardened environment makes it completely non-working, while it was working in debian 12. [ Impact ] I hadn't noticed the issue in my testing environment, but the reporter of #1118479 ended up in a completely non-working situation. [ Tests ] This was tested manually by the reporter. [ Risks ] The code is very trivial, it just extends the liveness of the underlying string. [ Checklist ] [X] *all* changes are documented in the d/changelog [X] I reviewed all changes and I approve them [X] attach debdiff against the package in (old)stable [X] the issue is verified as fixed in unstable [ Changes ] server->getSharedSecret().c_str() doesn't work because the string returned by getSharedSecret can actually be thrown away before we use the secret. Storing the string extends its liveness so the char* returned by c_str() can be read safely.diff -Nru openvpn-auth-radius-2.1/debian/changelog openvpn-auth-radius-2.1/debian/changelog --- openvpn-auth-radius-2.1/debian/changelog 2024-10-20 17:28:08.000000000 +0200 +++ openvpn-auth-radius-2.1/debian/changelog 2025-10-26 18:28:22.000000000 +0100 @@ -1,3 +1,10 @@ +openvpn-auth-radius (2.1-9+deb13u1) trixie; urgency=medium + + * patches/0008-authenticate-fix: Fix packet authentication + (Closes: Bug#1118479) + + -- Samuel Thibault <sthibault@debian.org> Sun, 26 Oct 2025 18:28:22 +0100 + openvpn-auth-radius (2.1-9) unstable; urgency=medium * QA upload. diff -Nru openvpn-auth-radius-2.1/debian/patches/0008-authenticate-fix openvpn-auth-radius-2.1/debian/patches/0008-authenticate-fix --- openvpn-auth-radius-2.1/debian/patches/0008-authenticate-fix 1970-01-01 01:00:00.000000000 +0100 +++ openvpn-auth-radius-2.1/debian/patches/0008-authenticate-fix 2025-10-21 00:11:25.000000000 +0200 @@ -0,0 +1,21 @@ +Description: Fix RADIUS Packet Authentication use-after-free + The BLASTRadius vulnerability mitigation introduced a use-after-free + in the RadiusPacket::authenticateReceivedPacket method. + This fix prevents use-after-free by assigning the string to a + variable before relying on the c_str result. +Author: Martin Rampersad <martin.rampersad@emkal.ca> +Last-Update: 2025-10-20 +--- +This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ +--- a/RadiusClass/RadiusPacket.cpp ++++ b/RadiusClass/RadiusPacket.cpp +@@ -706,7 +706,8 @@ + + int RadiusPacket::authenticateReceivedPacket(RadiusServer *server) + { +- const char *secret = server->getSharedSecret().c_str(); ++ string secretString = server->getSharedSecret(); ++ const char *secret = secretString.c_str(); + gcry_md_hd_t context; + int res; + diff -Nru openvpn-auth-radius-2.1/debian/patches/series openvpn-auth-radius-2.1/debian/patches/series --- openvpn-auth-radius-2.1/debian/patches/series 2024-10-20 17:27:15.000000000 +0200 +++ openvpn-auth-radius-2.1/debian/patches/series 2025-10-21 00:11:25.000000000 +0200 @@ -5,3 +5,4 @@ 40_use_cppflags.diff 0006-Support-verify-client-cert-directive-in-openvpn-2.4.patch 0007-RadiusBLAST +0008-authenticate-fix
--- End Message ---
--- Begin Message ---
- To: 1110859-done@bugs.debian.org, 1111236-done@bugs.debian.org, 1111733-done@bugs.debian.org, 1111734-done@bugs.debian.org, 1111808-done@bugs.debian.org, 1111819-done@bugs.debian.org, 1112097-done@bugs.debian.org, 1112120-done@bugs.debian.org, 1112256-done@bugs.debian.org, 1112261-done@bugs.debian.org, 1112276-done@bugs.debian.org, 1112282-done@bugs.debian.org, 1112283-done@bugs.debian.org, 1112380-done@bugs.debian.org, 1112479-done@bugs.debian.org, 1112557-done@bugs.debian.org, 1112668-done@bugs.debian.org, 1112671-done@bugs.debian.org, 1113711-done@bugs.debian.org, 1113750-done@bugs.debian.org, 1113757-done@bugs.debian.org, 1113761-done@bugs.debian.org, 1113778-done@bugs.debian.org, 1113799-done@bugs.debian.org, 1113804-done@bugs.debian.org, 1113860-done@bugs.debian.org, 1113882-done@bugs.debian.org, 1113902-done@bugs.debian.org, 1113904-done@bugs.debian.org, 1113961-done@bugs.debian.org, 1113979-done@bugs.debian.org, 1114595-done@bugs.debian.org, 1114684-done@bugs.debian.org, 1114755-done@bugs.debian.org, 1114855-done@bugs.debian.org, 1114929-done@bugs.debian.org, 1114979-done@bugs.debian.org, 1115257-done@bugs.debian.org, 1115486-done@bugs.debian.org, 1115530-done@bugs.debian.org, 1115749-done@bugs.debian.org, 1115815-done@bugs.debian.org, 1115860-done@bugs.debian.org, 1115899-done@bugs.debian.org, 1115914-done@bugs.debian.org, 1116012-done@bugs.debian.org, 1116020-done@bugs.debian.org, 1116040-done@bugs.debian.org, 1116053-done@bugs.debian.org, 1116127-done@bugs.debian.org, 1116196-done@bugs.debian.org, 1116201-done@bugs.debian.org, 1116386-done@bugs.debian.org, 1116523-done@bugs.debian.org, 1116526-done@bugs.debian.org, 1116547-done@bugs.debian.org, 1116575-done@bugs.debian.org, 1116665-done@bugs.debian.org, 1116705-done@bugs.debian.org, 1116938-done@bugs.debian.org, 1116945-done@bugs.debian.org, 1116983-done@bugs.debian.org, 1117467-done@bugs.debian.org, 1117469-done@bugs.debian.org, 1117828-done@bugs.debian.org, 1117843-done@bugs.debian.org, 1117876-done@bugs.debian.org, 1117909-done@bugs.debian.org, 1118008-done@bugs.debian.org, 1118037-done@bugs.debian.org, 1118047-done@bugs.debian.org, 1118228-done@bugs.debian.org, 1118374-done@bugs.debian.org, 1118434-done@bugs.debian.org, 1118443-done@bugs.debian.org, 1118458-done@bugs.debian.org, 1118547-done@bugs.debian.org, 1118657-done@bugs.debian.org, 1118663-done@bugs.debian.org, 1118673-done@bugs.debian.org, 1118674-done@bugs.debian.org, 1118737-done@bugs.debian.org, 1119085-done@bugs.debian.org, 1119088-done@bugs.debian.org, 1119115-done@bugs.debian.org, 1119136-done@bugs.debian.org, 1119142-done@bugs.debian.org, 1119256-done@bugs.debian.org, 1119286-done@bugs.debian.org, 1119287-done@bugs.debian.org, 1119288-done@bugs.debian.org, 1119291-done@bugs.debian.org, 1119301-done@bugs.debian.org, 1119303-done@bugs.debian.org, 1119719-done@bugs.debian.org, 1119798-done@bugs.debian.org, 1119854-done@bugs.debian.org, 1119909-done@bugs.debian.org, 1120048-done@bugs.debian.org, 1120050-done@bugs.debian.org, 1120054-done@bugs.debian.org, 1120125-done@bugs.debian.org, 1120129-done@bugs.debian.org, 1120143-done@bugs.debian.org, 1120145-done@bugs.debian.org, 1120148-done@bugs.debian.org, 1120151-done@bugs.debian.org, 1120262-done@bugs.debian.org, 1120278-done@bugs.debian.org, 1120289-done@bugs.debian.org, 1120325-done@bugs.debian.org, 1120345-done@bugs.debian.org, 1120350-done@bugs.debian.org, 1120358-done@bugs.debian.org, 1120360-done@bugs.debian.org, 1120445-done@bugs.debian.org
- Subject: Closing requests for updates included in 13.2
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 15 Nov 2025 11:21:45 +0000
- Message-id: <736c7150dc08501cc89945035c406eaf9688e144.camel@adam-barratt.org.uk>
Package: release.debian.org Version: 13.2 Hi, The updates referenced in each of these bugs were included in today's 13.2 trixie point release. Regards, Adam
--- End Message ---