The EAP-PWD function compute_password_element() leaks information about the password which allows an attacker to substantially reduce the size of an offline dictionary attack. References: https://freeradius.org/security/ Upstream fix: https://github.com/FreeRADIUS/freeradius-server/commit/9e5e8f2f
Created freeradius tracking bugs for this issue: Affects: fedora-all [bug 2078484]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2166 https://access.redhat.com/errata/RHSA-2023:2166
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2870 https://access.redhat.com/errata/RHSA-2023:2870
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-41859