A vulnerability has been found in the dyndisc example scripts (naptr-eduroam.sh,
radsec-dynsrv.sh) provided with radsecproxy.
For details, see
https://github.com/radsecproxy/radsecproxy/security/advisories/GHSA-56gw-9r…
Updated example scripts are provided with the 1.9.0 release. Note that the scripts are not
part of the installation package and are not updated automatically. If you are using the
examples, you have to update them manually.
Best regards,
Fabian
--
SWITCH
Fabian Mauchle, Network Engineer
Werdstrasse 2, P.O. Box, 8021 Zurich, Switzerland
Phone +41 44 268 15 30, direct +41 44 268 15 39