[Bug 219662] net/freeradius: CVE-2017-9148 FreeRADIUS TLS resumption authentication bypass

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Tue May 30 17:54:08 UTC 2017


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=219662

            Bug ID: 219662
           Summary: net/freeradius: CVE-2017-9148 FreeRADIUS TLS
                    resumption authentication bypass
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs at FreeBSD.org
          Reporter: ohartmann at walstatt.org

FreeRadius < 3.0.14 suffers from a bug in the caching mechanism, as reported in
"CVE-2017-9148 FreeRADIUS TLS resumption authentication bypass", as you can
read here:

http://seclists.org/oss-sec/2017/q2/342

There is a version 3.0.14 out, which fixes the bug.

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list