In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BNCTX instance to handle all handshakes. This mean multiple threads use the same BNCTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.
{
"binaries": [
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius-common"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius-config"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius-dhcp"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius-iodbc"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius-krb5"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius-ldap"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius-memcached"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius-mysql"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius-postgresql"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius-redis"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius-rest"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius-utils"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "freeradius-yubikey"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "libfreeradius-dev"
},
{
"binary_version": "3.0.16+dfsg-1ubuntu3.2",
"binary_name": "libfreeradius3"
}
],
"availability": "No subscription required"
}