CVE-2019-10143

Priority
Description
** DISPUTED ** It was discovered freeradius up to and including version
3.0.19 does not correctly configure logrotate, allowing a local attacker
who already has control of the radiusd user to escalate his privileges to
root, by tricking logrotate into writing a radiusd-writable file to a
directory normally inaccessible by the radiusd user. NOTE: the upstream
software maintainer has stated "there is simply no way for anyone to gain
privileges through this alleged issue."
Notes
leosilvafollowing the discussion from upstream..this issue
doesn't seems to be a security one. For now
moving it to low priority.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.10 (Eoan Ermine):needs-triage
Ubuntu 20.04 (Focal Fossa):needs-triage
More Information

Updated: 2020-01-29 18:56:28 UTC (commit 40f18bf14da5fb50662e1f861ea594a462b207fe)