The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories for the (1) cobbler, (2) inn, (3) safte-monitor, and (4) uucp packages.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T20:37:56.047Z
Reserved: 2011-03-30T00:00:00Z
Link: CVE-2011-1550

No data.

Status : Modified
Published: 2011-03-30T22:55:02.707
Modified: 2024-11-21T01:26:34.337
Link: CVE-2011-1550

No data.