mirror of
https://gitlab.com/openconnect/ocserv.git
synced 2026-03-27 15:27:53 +08:00
NEWS: updated
Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
This commit is contained in:
9
NEWS
9
NEWS
@@ -1,4 +1,11 @@
|
|||||||
* Version 1.4.1 (unreleased)
|
* Version 1.4.1 (released 2026-02-28)
|
||||||
|
- [SECURITY] Fixed authentication bypass (medium severity) when using
|
||||||
|
certificate authentication with cert-user-oid set to SAN(rfc822name):
|
||||||
|
a client presenting a valid CA-signed certificate without the expected
|
||||||
|
RFC822 SAN field could authenticate using password credentials alone,
|
||||||
|
bypassing the intended certificate-to-username binding. Requires the
|
||||||
|
attacker to possess both a valid CA-signed certificate and valid user
|
||||||
|
credentials (#694)
|
||||||
- The bundled inih was updated to r62.
|
- The bundled inih was updated to r62.
|
||||||
- The bundled protobuf-c was updated to 1.5.2.
|
- The bundled protobuf-c was updated to 1.5.2.
|
||||||
- Fixed a bug where session timeout could be bypassed by reconnecting
|
- Fixed a bug where session timeout could be bypassed by reconnecting
|
||||||
|
|||||||
Reference in New Issue
Block a user