Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110718084750.GA18157@flens.dfn-cert.de>
Date: Mon, 18 Jul 2011 10:47:50 +0200
From: dfncert@...-cert.de
To: Vincent Danen <vdanen@...hat.com>
Cc: oss-security@...ts.openwall.com, dfncert@...-cert.de
Subject: Re: CVE request: vulnerability in FreeRADIUS (OCSP)

On Fri, Jul 15, 2011 at 11:18:49AM -0600, Vincent Danen wrote:

> >A patch was proposed to the packet maintainer.
> 
> This is pretty light on the details.  Any references to supply or an
> actual description of the problem?
 
The implemented procedure does not verify the status of
the certificate. For instance, if the certificate has been revoked.


> Link to upstream fixes, emails, bugs, whatever?

We are not aware of any upstream fix.


-- 
DFN-CERT Services GmbH, https://www.dfn-cert.de/, Phone +49 40 808077-555
Sitz/Register: Hamburg,  AG Hamburg,  HRB 88805,  Ust-IdNr.: DE 232129737
Sachsenstraße 5, 20097 Hamburg/Germany,  CEO: Dr. Klaus-Peter Kossakowski

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.