Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 18 Jul 2011 10:47:50 +0200
From: dfncert@...-cert.de
To: Vincent Danen <vdanen@...hat.com>
Cc: oss-security@...ts.openwall.com, dfncert@...-cert.de
Subject: Re: CVE request: vulnerability in FreeRADIUS (OCSP)

On Fri, Jul 15, 2011 at 11:18:49AM -0600, Vincent Danen wrote:

> >A patch was proposed to the packet maintainer.
> 
> This is pretty light on the details.  Any references to supply or an
> actual description of the problem?
 
The implemented procedure does not verify the status of
the certificate. For instance, if the certificate has been revoked.


> Link to upstream fixes, emails, bugs, whatever?

We are not aware of any upstream fix.


-- 
DFN-CERT Services GmbH, https://www.dfn-cert.de/, Phone +49 40 808077-555
Sitz/Register: Hamburg,  AG Hamburg,  HRB 88805,  Ust-IdNr.: DE 232129737
Sachsenstra├če 5, 20097 Hamburg/Germany,  CEO: Dr. Klaus-Peter Kossakowski

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.