CVE-2011-1550

NameCVE-2011-1550
DescriptionThe default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories for the (1) cobbler, (2) inn, (3) safte-monitor, and (4) uucp packages.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
logrotate (PTS)jessie3.8.7-1fixed
stretch3.11.0-0.1fixed
buster3.14.0-4fixed
bullseye3.18.0-2+deb11u2fixed
bookworm3.21.0-1fixed
sid, trixie3.22.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
logrotatesource(unstable)(not affected)

Notes

- logrotate <not-affected> (SuSE-specific, see CVE-2011-1548 for Debian)

Search for package or bug name: Reporting problems