USN-3954-1

Source
https://ubuntu.com/security/notices/USN-3954-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3954-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-3954-1
Upstream
Related
Published
2019-04-24T12:39:28.854590Z
Modified
2025-10-13T04:34:49Z
Summary
freeradius vulnerabilities
Details

It was discovered that FreeRADIUS incorrectly handled certain inputs. An attacker could possibly use this issue to bypass authentication. (CVE-2019-11234, CVE-2019-11235)

References

Affected packages

Ubuntu:18.04:LTS / freeradius

Package

Name
freeradius
Purl
pkg:deb/ubuntu/freeradius@3.0.16+dfsg-1ubuntu3.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.16+dfsg-1ubuntu3.1

Affected versions

3.*

3.0.15+dfsg-1ubuntu2
3.0.16+dfsg-1ubuntu2
3.0.16+dfsg-1ubuntu3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "freeradius",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "freeradius-common",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "freeradius-config",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "freeradius-dhcp",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "freeradius-iodbc",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "freeradius-krb5",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "freeradius-ldap",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "freeradius-memcached",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "freeradius-mysql",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "freeradius-postgresql",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "freeradius-redis",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "freeradius-rest",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "freeradius-utils",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "freeradius-yubikey",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "libfreeradius-dev",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        },
        {
            "binary_name": "libfreeradius3",
            "binary_version": "3.0.16+dfsg-1ubuntu3.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:18.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2019-11234"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2019-11235"
        }
    ]
}