It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. CREATE(Triage): {Link=https://nvd.nist.gov/vuln/detail/CVE-2019-10143 User=admin}