The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories under /var/log/ for packages.
2011-03-30T22:55:02.610
2025-04-11T00:51:21.963
Deferred
CVSSv2: 6.3 (MEDIUM)
AV:L/AC:M/Au:N/C:N/I:C/A:C
3.4
9.2
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | gentoo | logrotate | * | Yes |
Operating System | gentoo | linux | * | No |