| Name | CVE-2015-3243 |
| Description | rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| rsyslog (PTS) | bullseye, bullseye (security) | 8.2102.0-2+deb11u1 | vulnerable |
| bookworm | 8.2302.0-1+deb12u1 | vulnerable |
| trixie | 8.2504.0-1 | vulnerable |
| forky, sid | 8.2510.0-2 | vulnerable |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|
| rsyslog | source | (unstable) | (unfixed) | unimportant | | |
Notes
The default for syslog is $FileCreateMode 0644 but the rsyslog.conf
provided by the Debian package sets $FileCreateMode 0640