** DISPUTED ** It was discovered freeradius up to and including version
3.0.19 does not correctly configure logrotate, allowing a local attacker
who already has control of the radiusd user to escalate his privileges to
root, by tricking logrotate into writing a radiusd-writable file to a
directory normally inaccessible by the radiusd user. NOTE: the upstream
software maintainer has stated "there is simply no way for anyone to gain
privileges through this alleged issue."
leosilvafollowing the discussion from upstream..this issue
doesn't seems to be a security one. For now
moving it to low priority.
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.10 (Eoan Ermine):needs-triage
Ubuntu 20.04 (Focal Fossa):needs-triage
More Information

Updated: 2020-01-29 18:56:28 UTC (commit 40f18bf14da5fb50662e1f861ea594a462b207fe)