freeradius2: backport fix for CVE-2015-4680
authorJo-Philipp Wich <jow@openwrt.org>
Mon, 20 Jul 2015 08:32:21 +0000 (10:32 +0200)
committerJo-Philipp Wich <jow@openwrt.org>
Mon, 20 Jul 2015 08:38:03 +0000 (10:38 +0200)
commitde5e37ac5be3d44c335faa9652bf4ce15784f4ad
tree4a84f0b88d380c512b237aa1a2350f1265049b9d
parentdf564f39876a8b9684a1f79048a40fc9c0e99e66
freeradius2: backport fix for CVE-2015-4680

Backport upstream commit 5e698b407dcac2bc45cf03484bac4398109d25c3 to fix
missing intermediate certificate validation in Freeradius2.

Advisory:

The FreeRADIUS server relies on OpenSSL to perform certificate validation,
including Certificate Revocation List (CRL) checks. The FreeRADIUS usage of
OpenSSL, in CRL application, limits the checks to leaf certificates,
therefore not detecting revocation of intermediate CA certificates.

An unexpired client certificate, issued by an intermediate CA with a revoked
certificate, is therefore accepted by FreeRADIUS.

Specifically sets the X509_V_FLAG_CRL_CHECK flag for leaf certificate CRL
checks, but does not use X509_V_FLAG_CRL_CHECK_ALL for CRL checks on the
complete trust chain.

The FreeRADIUS project advises that the recommended configuration is to use
self-signed CAs for all EAP-TLS methods.

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
net/freeradius2/Makefile
net/freeradius2/patches/012-CVE-2015-4680.patch [new file with mode: 0644]