Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-2181 | It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue." |
Fri, 20 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T22:10:10.031Z
Reserved: 2019-03-27T00:00:00.000Z
Link: CVE-2019-10143
Updated: 2024-08-04T22:10:10.031Z
Status : Modified
Published: 2019-05-24T17:29:02.490
Modified: 2024-11-21T04:18:30.510
Link: CVE-2019-10143
OpenCVE Enrichment
No data.
EUVD