ArchLinux: 201508-6: freeradius: insufficient CRL validation
Summary
The FreeRADIUS server relies on OpenSSL to perform certificate validation, including Certificate Revocation List (CRL) checks. The FreeRADIUS usage of OpenSSL, in CRL application, limits the checks to leaf certificates, therefore not detecting revocation of intermediate CA certificates. An unexpired client certificate, issued by an intermediate CA with a revoked certificate, is therefore accepted by FreeRADIUS.
Resolution
Upgrade to 3.0.9-1.
# pacman -Syu "freeradius>=3.0.9-1"
The problem has been fixed upstream in version 3.0.9 and 2.2.8.
References
https://www.freeradius.org/security/ http://ocert.org/advisories/ocert-2015-008.html https://access.redhat.com/security/cve/CVE-2015-4680
![Dist Arch](/images/distros/dist-arch.png)
Workaround
The FreeRADIUS project advises to use self-signed CAs without intermediate CAs for EAP-TLS, as only intermediate CAs are apparently vulnerable to this issue.