Bug 1142669
Summary: | EAP-TLS and OCSP validation causing segmentation fault + patch | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Michal Bruncko <michal.bruncko> | ||||
Component: | freeradius | Assignee: | Nikolai Kondrashov <nikolai.kondrashov> | ||||
Status: | CLOSED ERRATA | QA Contact: | Jaroslav Aster <jaster> | ||||
Severity: | medium | Docs Contact: | |||||
Priority: | unspecified | ||||||
Version: | 6.5 | CC: | dpal, ebenes, jaster, nikolai.kondrashov, pkis | ||||
Target Milestone: | rc | ||||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | freeradius-2.2.6-1.el6 | Doc Type: | Bug Fix | ||||
Doc Text: |
During the Online Certificate Status Protocol (OCSP) validation, radiusd terminated unexpectedly with a segmentation fault after attempting to access the next update field that was not provided by the OCSP responder. Now, radiusd does not crash in this situation and instead continues to complete the OCSP validation.
|
Story Points: | --- | ||||
Clone Of: | Environment: | ||||||
Last Closed: | 2015-07-22 06:16:53 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Attachments: |
|
Description
Michal Bruncko
2014-09-17 07:55:14 UTC
Comment on attachment 938373 [details] fixing patch affected part extracted from commit https://github.com/FreeRADIUS/freeradius-server/commit/dc53285b1d660737717d88da14edf73813cabd0f Thank you very much for the report and the patch, Michal. I'll see if we can get it into RHEL6.6. Unfortunately, we're too late for RHEL6.6, so this fix will have to go into RHEL6.7. If you still would like to have this fixed in RHEL6.6 please contact support. not problem at all. even if it could be included in RHEL6.7 it will be fine. just wanted to confirm that with patch above SIGSEGV not occur withing OCSP verification and radiusd is stable. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2015-1287.html |