File _patchinfo of Package patchinfo.14500
<patchinfo incident="14500">
<issue tracker="cve" id="2019-13456"/>
<issue tracker="cve" id="2019-17185"/>
<issue tracker="bnc" id="1146848">freeradius still continues establish connection evern with cert error and softfail set as no</issue>
<issue tracker="bnc" id="1166847">VUL-0: CVE-2019-17185: freeradius-server: Fix DoS issues due to multithreaded BN_CTX access</issue>
<issue tracker="bnc" id="1144524">VUL-0: CVE-2019-13456: freeradius-server: no validation of peer's scalar and elliptic curve point when processing an EAP-pwd Commit frame may lead to authentication bypass</issue>
<packager>adamm</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for freeradius-server</summary>
<description>This update for freeradius-server fixes the following issues:
- CVE-2019-13456: Fixed a side-channel password leak in EAP-pwd
(bsc#1144524).
- CVE-2019-17185: Fixed a debial of service due to multithreaded
BN_CTX access (bsc#1166847).
- Fixed an issue in TLS-EAP where the OCSP verification, when an
intermediate client certificate was not explicitly trusted
(bsc#1146848).
</description>
</patchinfo>