<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">freeradius-server-3.0.23-1.5 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10767</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">freeradius-server-3.0.23-1.5 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the freeradius-server-3.0.23-1.5 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10767</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10767</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-4474/</URL>
      <Description>SUSE CVE CVE-2008-4474 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4680/</URL>
      <Description>SUSE CVE CVE-2015-4680 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8763/</URL>
      <Description>SUSE CVE CVE-2015-8763 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10978/</URL>
      <Description>SUSE CVE CVE-2017-10978 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10983/</URL>
      <Description>SUSE CVE CVE-2017-10983 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10984/</URL>
      <Description>SUSE CVE CVE-2017-10984 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10985/</URL>
      <Description>SUSE CVE CVE-2017-10985 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10986/</URL>
      <Description>SUSE CVE CVE-2017-10986 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10987/</URL>
      <Description>SUSE CVE CVE-2017-10987 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10988/</URL>
      <Description>SUSE CVE CVE-2017-10988 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9148/</URL>
      <Description>SUSE CVE CVE-2017-9148 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11234/</URL>
      <Description>SUSE CVE CVE-2019-11234 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13456/</URL>
      <Description>SUSE CVE CVE-2019-13456 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17185/</URL>
      <Description>SUSE CVE CVE-2019-17185 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-3.0.23-1.5">
      <FullProductName ProductID="freeradius-server-3.0.23-1.5">freeradius-server-3.0.23-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-devel-3.0.23-1.5">
      <FullProductName ProductID="freeradius-server-devel-3.0.23-1.5">freeradius-server-devel-3.0.23-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-doc-3.0.23-1.5">
      <FullProductName ProductID="freeradius-server-doc-3.0.23-1.5">freeradius-server-doc-3.0.23-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-krb5-3.0.23-1.5">
      <FullProductName ProductID="freeradius-server-krb5-3.0.23-1.5">freeradius-server-krb5-3.0.23-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-ldap-3.0.23-1.5">
      <FullProductName ProductID="freeradius-server-ldap-3.0.23-1.5">freeradius-server-ldap-3.0.23-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-ldap-schemas-3.0.23-1.5">
      <FullProductName ProductID="freeradius-server-ldap-schemas-3.0.23-1.5">freeradius-server-ldap-schemas-3.0.23-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-libs-3.0.23-1.5">
      <FullProductName ProductID="freeradius-server-libs-3.0.23-1.5">freeradius-server-libs-3.0.23-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-mysql-3.0.23-1.5">
      <FullProductName ProductID="freeradius-server-mysql-3.0.23-1.5">freeradius-server-mysql-3.0.23-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-perl-3.0.23-1.5">
      <FullProductName ProductID="freeradius-server-perl-3.0.23-1.5">freeradius-server-perl-3.0.23-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-postgresql-3.0.23-1.5">
      <FullProductName ProductID="freeradius-server-postgresql-3.0.23-1.5">freeradius-server-postgresql-3.0.23-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-python3-3.0.23-1.5">
      <FullProductName ProductID="freeradius-server-python3-3.0.23-1.5">freeradius-server-python3-3.0.23-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-sqlite-3.0.23-1.5">
      <FullProductName ProductID="freeradius-server-sqlite-3.0.23-1.5">freeradius-server-sqlite-3.0.23-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeradius-server-utils-3.0.23-1.5">
      <FullProductName ProductID="freeradius-server-utils-3.0.23-1.5">freeradius-server-utils-3.0.23-1.5</FullProductName>
    </Branch>
    <Relationship ProductReference="freeradius-server-3.0.23-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freeradius-server-3.0.23-1.5">freeradius-server-3.0.23-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-devel-3.0.23-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5">freeradius-server-devel-3.0.23-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-doc-3.0.23-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5">freeradius-server-doc-3.0.23-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-krb5-3.0.23-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5">freeradius-server-krb5-3.0.23-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-ldap-3.0.23-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5">freeradius-server-ldap-3.0.23-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-ldap-schemas-3.0.23-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5">freeradius-server-ldap-schemas-3.0.23-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-libs-3.0.23-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5">freeradius-server-libs-3.0.23-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-mysql-3.0.23-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5">freeradius-server-mysql-3.0.23-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-perl-3.0.23-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5">freeradius-server-perl-3.0.23-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-postgresql-3.0.23-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5">freeradius-server-postgresql-3.0.23-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-python3-3.0.23-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5">freeradius-server-python3-3.0.23-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-sqlite-3.0.23-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5">freeradius-server-sqlite-3.0.23-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeradius-server-utils-3.0.23-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5">freeradius-server-utils-3.0.23-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">freeradius-dialupadmin in freeradius 2.0.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files in (1) backup_radacct, (2) clean_radacct, (3) monthly_tot_stats, (4) tot_stats, and (5) truncate_radacct.</Note>
    </Notes>
    <CVE>CVE-2008-4474</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-4474.html</URL>
        <Description>CVE-2008-4474</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/433762</URL>
        <Description>SUSE Bug 433762</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeRADIUS 2.2.x before 2.2.8 and 3.0.x before 3.0.9 does not properly check revocation of intermediate CA certificates.</Note>
    </Notes>
    <CVE>CVE-2015-4680</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4680.html</URL>
        <Description>CVE-2015-4680</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935573</URL>
        <Description>SUSE Bug 935573</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to have unspecified impact via a crafted (1) commit or (2) confirm message, which triggers an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2015-8763</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8763.html</URL>
        <Description>CVE-2015-8763</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961479</URL>
        <Description>SUSE Bug 961479</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An FR-GV-201 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "Read / write overflow in make_secret()" and a denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-10978</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10978.html</URL>
        <Description>CVE-2017-10978</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049086</URL>
        <Description>SUSE Bug 1049086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An FR-GV-206 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "DHCP - Read overflow when decoding option 63" and a denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-10983</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10983.html</URL>
        <Description>CVE-2017-10983</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049086</URL>
        <Description>SUSE Bug 1049086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An FR-GV-301 issue in FreeRADIUS 3.x before 3.0.15 allows "Write overflow in data2vp_wimax()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code.</Note>
    </Notes>
    <CVE>CVE-2017-10984</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10984.html</URL>
        <Description>CVE-2017-10984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049086</URL>
        <Description>SUSE Bug 1049086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An FR-GV-302 issue in FreeRADIUS 3.x before 3.0.15 allows "Infinite loop and memory exhaustion with 'concat' attributes" and a denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-10985</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10985.html</URL>
        <Description>CVE-2017-10985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049086</URL>
        <Description>SUSE Bug 1049086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An FR-GV-303 issue in FreeRADIUS 3.x before 3.0.15 allows "DHCP - Infinite read in dhcp_attr2vp()" and a denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-10986</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10986.html</URL>
        <Description>CVE-2017-10986</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049086</URL>
        <Description>SUSE Bug 1049086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An FR-GV-304 issue in FreeRADIUS 3.x before 3.0.15 allows "DHCP - Buffer over-read in fr_dhcp_decode_suboptions()" and a denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-10987</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10987.html</URL>
        <Description>CVE-2017-10987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049086</URL>
        <Description>SUSE Bug 1049086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.</Note>
    </Notes>
    <CVE>CVE-2017-10988</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10988.html</URL>
        <Description>CVE-2017-10988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049086</URL>
        <Description>SUSE Bug 1049086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.</Note>
    </Notes>
    <CVE>CVE-2017-9148</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9148.html</URL>
        <Description>CVE-2017-9148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1041445</URL>
        <Description>SUSE Bug 1041445</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1046141</URL>
        <Description>SUSE Bug 1046141</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeRADIUS before 3.0.19 does not prevent use of reflection for authentication spoofing, aka a "Dragonblood" issue, a similar issue to CVE-2019-9497.</Note>
    </Notes>
    <CVE>CVE-2019-11234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11234.html</URL>
        <Description>CVE-2019-11234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132664</URL>
        <Description>SUSE Bug 1132664</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.</Note>
    </Notes>
    <CVE>CVE-2019-13456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13456.html</URL>
        <Description>CVE-2019-13456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1144524</URL>
        <Description>SUSE Bug 1144524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1166858</URL>
        <Description>SUSE Bug 1166858</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.</Note>
    </Notes>
    <CVE>CVE-2019-17185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freeradius-server-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-devel-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-doc-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-krb5-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-ldap-schemas-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-libs-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-mysql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-perl-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-postgresql-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-python3-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-sqlite-3.0.23-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:freeradius-server-utils-3.0.23-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17185.html</URL>
        <Description>CVE-2019-17185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1166847</URL>
        <Description>SUSE Bug 1166847</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
