FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"extracted_events": [
{
"last_affected": "18.04"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "18.10"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "19.04"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "15.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.6"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.6"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.6"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
],
"source": "CPE_FIELD"
}
]
}{
"cpe": "cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "3.0.19"
}
],
"source": "CPE_FIELD"
}[
{
"signature_type": "Function",
"id": "CVE-2019-11235-1fd28794",
"signature_version": "v1",
"deprecated": false,
"source": "https://github.com/freeradius/freeradius-server/commit/ab4c767099f263a7cd4109bcdca80ee74210a769",
"target": {
"function": "process_peer_commit",
"file": "src/modules/rlm_eap/types/rlm_eap_pwd/eap_pwd.c"
},
"digest": {
"function_hash": "129569143899151200956858467118537793085",
"length": 3217.0
}
},
{
"target": {
"file": "src/modules/rlm_eap/types/rlm_eap_pwd/eap_pwd.c"
},
"id": "CVE-2019-11235-7d9d3913",
"signature_version": "v1",
"deprecated": false,
"source": "https://github.com/freeradius/freeradius-server/commit/ab4c767099f263a7cd4109bcdca80ee74210a769",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"44628322362010892775297859780437640634",
"247023918149329515823030769271528430332",
"224033363932944218881098358854636411965",
"17630095911784018250606902112754836822",
"216632450278555283936186076618328015503",
"95929150371845356609814502021181772614",
"55929718924763167308877861755612329536",
"22676619042527158489947307178530195583"
]
}
}
]
"2026-04-11T18:25:00Z"
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-11235.json"