Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2022-1348
Disclosure Date: May 25, 2022 (last updated October 07, 2023)
A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any rotation. This flaw affects logrotate versions before 3.20.0.
0
Attacker Value
Unknown
CVE-2011-1155
Disclosure Date: March 30, 2011 (last updated October 04, 2023)
The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
0
Attacker Value
Unknown
CVE-2011-1154
Disclosure Date: March 30, 2011 (last updated October 04, 2023)
The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
0
Attacker Value
Unknown
CVE-2011-1550
Disclosure Date: March 30, 2011 (last updated October 04, 2023)
The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories for the (1) cobbler, (2) inn, (3) safte-monitor, and (4) uucp packages.
0
Attacker Value
Unknown
CVE-2011-1548
Disclosure Date: March 30, 2011 (last updated October 04, 2023)
The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.
0
Attacker Value
Unknown
CVE-2011-1549
Disclosure Date: March 30, 2011 (last updated October 04, 2023)
The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories under /var/log/ for packages.
0
Attacker Value
Unknown
CVE-2011-1098
Disclosure Date: March 30, 2011 (last updated October 04, 2023)
Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.
0