Security update for configurations with TLS; FreeRADIUS intentionally skips inner authentication for TLS resumption, however it allows a session to be resumed before the initial connection has authenticated, allowing access without auth to a malicious supplicant. CVE-2017-9148, See http://seclists.org/oss-sec/2017/q2/342 Workaround: set "enabled = no" in the cache section of raddb/mods-enabled/eap.
17 lines
553 B
Plaintext
17 lines
553 B
Plaintext
$OpenBSD: patch-src_main_detail_c,v 1.5 2017/05/30 13:12:30 sthen Exp $
|
|
|
|
Cope with 32-bit arch with 64-bit time variables.
|
|
|
|
Index: src/main/detail.c
|
|
--- src/main/detail.c.orig
|
|
+++ src/main/detail.c
|
|
@@ -784,7 +784,7 @@ open_file:
|
|
*/
|
|
alloc_packet:
|
|
if (data->done_entry) {
|
|
- DEBUG2("detail (%s): Skipping record for timestamp %lu", data->name, data->timestamp);
|
|
+ DEBUG2("detail (%s): Skipping record for timestamp %lld", data->name, (long long)data->timestamp);
|
|
fr_pair_list_free(&data->vps);
|
|
data->state = STATE_HEADER;
|
|
goto do_header;
|