CVE-2011-1550

NameCVE-2011-1550
DescriptionThe default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories for the (1) cobbler, (2) inn, (3) safte-monitor, and (4) uucp packages.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
logrotate (PTS)stretch3.11.0-0.1fixed
buster3.14.0-4fixed
bullseye3.18.0-2fixed
bookworm, sid3.18.1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
logrotatesource(unstable)(not affected)

Notes

- logrotate <not-affected> (SuSE-specific, see CVE-2011-1548 for Debian)

Search for package or bug name: Reporting problems