Summary: | <net-dialup/freeradius-3.0.14: TLS resumption authentication bypass (CVE-2017-9148) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | maintainer-needed, mr |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2017/05/29/1 | ||
Whiteboard: | B3 [glsa cve] | ||
Package list: |
net-dialup/freeradius-3.0.14
|
Runtime testing required: | --- |
Description
Agostino Sarubbo
2017-05-30 07:49:09 UTC
*** Bug 620102 has been marked as a duplicate of this bug. *** @ Arches, please test and mark stable: =net-dialup/freeradius-3.0.14 amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please vote. GLSA Vote: Yes New GLSA request filed. This issue was resolved and addressed in GLSA 201706-27 at https://security.gentoo.org/glsa/201706-27 by GLSA coordinator Thomas Deutschmann (whissi). |