The default logrotate configuration on Gentoo Linux permits symlink and hard link attacks by non-root user
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | CVE-2011-1549 | 30 Mar 201122:00 | – | cvelist |
![]() | CVE-2011-1549 | 30 Mar 201122:55 | – | nvd |
![]() | Default configuration | 30 Mar 201122:55 | – | prion |
![]() | CVE-2011-1549 | 30 Mar 201122:55 | – | cve |
![]() | CVE-2011-1549 | 30 Mar 201100:00 | – | ubuntucve |
![]() | GLSA-201206-36 : logrotate: Multiple vulnerabilities | 26 Jun 201200:00 | – | nessus |
![]() | Gentoo Security Advisory GLSA 201206-36 (logrotate) | 10 Aug 201200:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 201206-36 (logrotate) | 10 Aug 201200:00 | – | openvas |
![]() | logrotate: Multiple vulnerabilities | 25 Jun 201200:00 | – | gentoo |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | logrotate | 3.21.0-1 | logrotate_3.21.0-1_all.deb |
Debian | 11 | all | logrotate | 3.18.0-2+deb11u2 | logrotate_3.18.0-2+deb11u2_all.deb |
Debian | 999 | all | logrotate | 3.22.0-1 | logrotate_3.22.0-1_all.deb |
Debian | 13 | all | logrotate | 3.22.0-1 | logrotate_3.22.0-1_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo