openbsd-ports/net/freeradius3/patches/patch-src_main_detail_c
sthen a4d4b9922a update to freeradius 3.0.14.
Security update for configurations with TLS; FreeRADIUS intentionally
skips inner authentication for TLS resumption, however it allows a
session to be resumed before the initial connection has authenticated,
allowing access without auth to a malicious supplicant. CVE-2017-9148,
See http://seclists.org/oss-sec/2017/q2/342

Workaround: set "enabled = no" in the cache section of raddb/mods-enabled/eap.
2017-05-30 13:12:30 +00:00

17 lines
553 B
Plaintext

$OpenBSD: patch-src_main_detail_c,v 1.5 2017/05/30 13:12:30 sthen Exp $
Cope with 32-bit arch with 64-bit time variables.
Index: src/main/detail.c
--- src/main/detail.c.orig
+++ src/main/detail.c
@@ -784,7 +784,7 @@ open_file:
*/
alloc_packet:
if (data->done_entry) {
- DEBUG2("detail (%s): Skipping record for timestamp %lu", data->name, data->timestamp);
+ DEBUG2("detail (%s): Skipping record for timestamp %lld", data->name, (long long)data->timestamp);
fr_pair_list_free(&data->vps);
data->state = STATE_HEADER;
goto do_header;