openSUSE-SU-2020:0553-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2020:0553-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/openSUSE-SU-2020:0553-1
Related
Published
2020-04-26T12:11:06Z
Modified
2020-04-26T12:11:06Z
Summary
Security update for freeradius-server
Details

This update for freeradius-server fixes the following issues:

  • CVE-2019-13456: Fixed a side-channel password leak in EAP-pwd (bsc#1144524).
  • CVE-2019-17185: Fixed a debial of service due to multithreaded BN_CTX access (bsc#1166847).
  • Fixed an issue in TLS-EAP where the OCSP verification, when an intermediate client certificate was not explicitly trusted (bsc#1146848).

This update was imported from the SUSE:SLE-15:Update update project.

References

Affected packages

openSUSE:Leap 15.1 / freeradius-server

Package

Name
freeradius-server
Purl
pkg:rpm/opensuse/freeradius-server&distro=openSUSE%20Leap%2015.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.16-lp151.4.4.1

Ecosystem specific

{
    "binaries": [
        {
            "freeradius-server-libs": "3.0.16-lp151.4.4.1",
            "freeradius-server-doc": "3.0.16-lp151.4.4.1",
            "freeradius-server": "3.0.16-lp151.4.4.1",
            "freeradius-server-devel": "3.0.16-lp151.4.4.1",
            "freeradius-server-krb5": "3.0.16-lp151.4.4.1",
            "freeradius-server-utils": "3.0.16-lp151.4.4.1",
            "freeradius-server-mysql": "3.0.16-lp151.4.4.1",
            "freeradius-server-sqlite": "3.0.16-lp151.4.4.1",
            "freeradius-server-postgresql": "3.0.16-lp151.4.4.1",
            "freeradius-server-ldap": "3.0.16-lp151.4.4.1",
            "freeradius-server-perl": "3.0.16-lp151.4.4.1",
            "freeradius-server-python": "3.0.16-lp151.4.4.1"
        }
    ]
}