Gentoo

Logrotate

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 30.03.2011 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.

  • EPSS 0.06%
  • Veröffentlicht 30.03.2011 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on...

  • EPSS 0.09%
  • Veröffentlicht 30.03.2011 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a...

  • EPSS 0.06%
  • Veröffentlicht 30.03.2011 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of sup...

  • EPSS 0.06%
  • Veröffentlicht 30.03.2011 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support...

  • EPSS 0.05%
  • Veröffentlicht 30.03.2011 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack o...