[Bug 219662] net/freeradius: CVE-2017-9148 FreeRADIUS TLS resumption authentication bypass
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Tue May 30 17:54:08 UTC 2017
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=219662
Bug ID: 219662
Summary: net/freeradius: CVE-2017-9148 FreeRADIUS TLS
resumption authentication bypass
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
Status: New
Severity: Affects Many People
Priority: ---
Component: Individual Port(s)
Assignee: freebsd-ports-bugs at FreeBSD.org
Reporter: ohartmann at walstatt.org
FreeRadius < 3.0.14 suffers from a bug in the caching mechanism, as reported in
"CVE-2017-9148 FreeRADIUS TLS resumption authentication bypass", as you can
read here:
http://seclists.org/oss-sec/2017/q2/342
There is a version 3.0.14 out, which fixes the bug.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list