CVE-2019-11235
22.04.2019, 11:29
FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.Enginsight
Vendor | Product | Version |
---|---|---|
freeradius | freeradius | 𝑥 < 3.0.19 |
fedoraproject | fedora | - |
redhat | enterprise_linux | 7.0 |
redhat | enterprise_linux_eus | 7.6 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.6 |
redhat | enterprise_linux_server_tus | 7.6 |
redhat | enterprise_linux_workstation | 7.0 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 18.10 |
canonical | ubuntu_linux | 19.04 |
opensuse | leap | 15.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References