Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2020:4799

Опубликовано: 03 нояб. 2020
Источник: rocky
Оценка: Moderate

Описание

Moderate: freeradius:3.0 security and bug fix update

FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.

Security Fix(es):

  • freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access (CVE-2019-17185)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
freeradiusx86_643.module+el8.4.0+576+2d493411freeradius-3.0.20-3.module+el8.4.0+576+2d493411.x86_64.rpm
freeradius-develx86_643.module+el8.4.0+576+2d493411freeradius-devel-3.0.20-3.module+el8.4.0+576+2d493411.x86_64.rpm
freeradius-docx86_643.module+el8.4.0+576+2d493411freeradius-doc-3.0.20-3.module+el8.4.0+576+2d493411.x86_64.rpm
freeradius-krb5x86_643.module+el8.4.0+576+2d493411freeradius-krb5-3.0.20-3.module+el8.4.0+576+2d493411.x86_64.rpm
freeradius-ldapx86_643.module+el8.4.0+576+2d493411freeradius-ldap-3.0.20-3.module+el8.4.0+576+2d493411.x86_64.rpm
freeradius-mysqlx86_643.module+el8.4.0+576+2d493411freeradius-mysql-3.0.20-3.module+el8.4.0+576+2d493411.x86_64.rpm
freeradius-perlx86_643.module+el8.4.0+576+2d493411freeradius-perl-3.0.20-3.module+el8.4.0+576+2d493411.x86_64.rpm
freeradius-postgresqlx86_643.module+el8.4.0+576+2d493411freeradius-postgresql-3.0.20-3.module+el8.4.0+576+2d493411.x86_64.rpm
freeradius-restx86_643.module+el8.4.0+576+2d493411freeradius-rest-3.0.20-3.module+el8.4.0+576+2d493411.x86_64.rpm
freeradius-sqlitex86_643.module+el8.4.0+576+2d493411freeradius-sqlite-3.0.20-3.module+el8.4.0+576+2d493411.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

CVSS3: 7.5
redhat
около 6 лет назад

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

CVSS3: 7.5
nvd
больше 5 лет назад

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

CVSS3: 7.5
debian
больше 5 лет назад

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global Op ...

CVSS3: 7.5
github
больше 3 лет назад

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.