<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for freeradius-server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:0553-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-04-26T12:11:06Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-04-26T12:11:06Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-04-26T12:11:06Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for freeradius-server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for freeradius-server fixes the following issues:

- CVE-2019-13456: Fixed a side-channel password leak in EAP-pwd
  (bsc#1144524).
- CVE-2019-17185: Fixed a debial of service due to multithreaded
  BN_CTX access (bsc#1166847).
- Fixed an issue in TLS-EAP where the OCSP verification, when an 
  intermediate client certificate was not explicitly trusted 
  (bsc#1146848).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-553</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TMVXSP5XFJILXXXL4PCJEJOUEIQCWQ5X/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:0553-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1144524</URL>
      <Description>SUSE Bug 1144524</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1146848</URL>
      <Description>SUSE Bug 1146848</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1166847</URL>
      <Description>SUSE Bug 1166847</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13456/</URL>
      <Description>SUSE CVE CVE-2019-13456 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17185/</URL>
      <Description>SUSE CVE CVE-2019-17185 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-3.0.16-lp151.4.4.1">
      <FullProductName ProductID="freeradius-server-3.0.16-lp151.4.4.1">freeradius-server-3.0.16-lp151.4.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-devel-3.0.16-lp151.4.4.1">
      <FullProductName ProductID="freeradius-server-devel-3.0.16-lp151.4.4.1">freeradius-server-devel-3.0.16-lp151.4.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-doc-3.0.16-lp151.4.4.1">
      <FullProductName ProductID="freeradius-server-doc-3.0.16-lp151.4.4.1">freeradius-server-doc-3.0.16-lp151.4.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-krb5-3.0.16-lp151.4.4.1">
      <FullProductName ProductID="freeradius-server-krb5-3.0.16-lp151.4.4.1">freeradius-server-krb5-3.0.16-lp151.4.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-ldap-3.0.16-lp151.4.4.1">
      <FullProductName ProductID="freeradius-server-ldap-3.0.16-lp151.4.4.1">freeradius-server-ldap-3.0.16-lp151.4.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-libs-3.0.16-lp151.4.4.1">
      <FullProductName ProductID="freeradius-server-libs-3.0.16-lp151.4.4.1">freeradius-server-libs-3.0.16-lp151.4.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-mysql-3.0.16-lp151.4.4.1">
      <FullProductName ProductID="freeradius-server-mysql-3.0.16-lp151.4.4.1">freeradius-server-mysql-3.0.16-lp151.4.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-perl-3.0.16-lp151.4.4.1">
      <FullProductName ProductID="freeradius-server-perl-3.0.16-lp151.4.4.1">freeradius-server-perl-3.0.16-lp151.4.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-postgresql-3.0.16-lp151.4.4.1">
      <FullProductName ProductID="freeradius-server-postgresql-3.0.16-lp151.4.4.1">freeradius-server-postgresql-3.0.16-lp151.4.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-python-3.0.16-lp151.4.4.1">
      <FullProductName ProductID="freeradius-server-python-3.0.16-lp151.4.4.1">freeradius-server-python-3.0.16-lp151.4.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-sqlite-3.0.16-lp151.4.4.1">
      <FullProductName ProductID="freeradius-server-sqlite-3.0.16-lp151.4.4.1">freeradius-server-sqlite-3.0.16-lp151.4.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-utils-3.0.16-lp151.4.4.1">
      <FullProductName ProductID="freeradius-server-utils-3.0.16-lp151.4.4.1">freeradius-server-utils-3.0.16-lp151.4.4.1</FullProductName>
    </Branch>
    <Relationship ProductReference="freeradius-server-3.0.16-lp151.4.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freeradius-server-3.0.16-lp151.4.4.1">freeradius-server-3.0.16-lp151.4.4.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-devel-3.0.16-lp151.4.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freeradius-server-devel-3.0.16-lp151.4.4.1">freeradius-server-devel-3.0.16-lp151.4.4.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-doc-3.0.16-lp151.4.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freeradius-server-doc-3.0.16-lp151.4.4.1">freeradius-server-doc-3.0.16-lp151.4.4.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-krb5-3.0.16-lp151.4.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freeradius-server-krb5-3.0.16-lp151.4.4.1">freeradius-server-krb5-3.0.16-lp151.4.4.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-ldap-3.0.16-lp151.4.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freeradius-server-ldap-3.0.16-lp151.4.4.1">freeradius-server-ldap-3.0.16-lp151.4.4.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-libs-3.0.16-lp151.4.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freeradius-server-libs-3.0.16-lp151.4.4.1">freeradius-server-libs-3.0.16-lp151.4.4.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-mysql-3.0.16-lp151.4.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freeradius-server-mysql-3.0.16-lp151.4.4.1">freeradius-server-mysql-3.0.16-lp151.4.4.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-perl-3.0.16-lp151.4.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freeradius-server-perl-3.0.16-lp151.4.4.1">freeradius-server-perl-3.0.16-lp151.4.4.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-postgresql-3.0.16-lp151.4.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freeradius-server-postgresql-3.0.16-lp151.4.4.1">freeradius-server-postgresql-3.0.16-lp151.4.4.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-python-3.0.16-lp151.4.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freeradius-server-python-3.0.16-lp151.4.4.1">freeradius-server-python-3.0.16-lp151.4.4.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-sqlite-3.0.16-lp151.4.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freeradius-server-sqlite-3.0.16-lp151.4.4.1">freeradius-server-sqlite-3.0.16-lp151.4.4.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-utils-3.0.16-lp151.4.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freeradius-server-utils-3.0.16-lp151.4.4.1">freeradius-server-utils-3.0.16-lp151.4.4.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.</Note>
    </Notes>
    <CVE>CVE-2019-13456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:freeradius-server-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-devel-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-doc-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-krb5-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-ldap-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-libs-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-mysql-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-perl-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-postgresql-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-python-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-sqlite-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-utils-3.0.16-lp151.4.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TMVXSP5XFJILXXXL4PCJEJOUEIQCWQ5X/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13456.html</URL>
        <Description>CVE-2019-13456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1144524</URL>
        <Description>SUSE Bug 1144524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1166858</URL>
        <Description>SUSE Bug 1166858</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.</Note>
    </Notes>
    <CVE>CVE-2019-17185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:freeradius-server-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-devel-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-doc-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-krb5-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-ldap-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-libs-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-mysql-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-perl-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-postgresql-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-python-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-sqlite-3.0.16-lp151.4.4.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freeradius-server-utils-3.0.16-lp151.4.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TMVXSP5XFJILXXXL4PCJEJOUEIQCWQ5X/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17185.html</URL>
        <Description>CVE-2019-17185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1166847</URL>
        <Description>SUSE Bug 1166847</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
