Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo logrotate vulnerabilities and exploits
(subscribe to this query)
1.9
CVSSv2
CVE-2011-1098
Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and previous versions allows local users to read log data by opening a file before the intended permissions are in place.
Gentoo Logrotate 3.6.5
Gentoo Logrotate 3.7.8
Gentoo Logrotate 3.5.9
Gentoo Logrotate 3.7.6
Gentoo Logrotate 3.3
Gentoo Logrotate 3.7.2
Gentoo Logrotate 3.7
Gentoo Logrotate 3.7.1
Gentoo Logrotate
Gentoo Logrotate 3.7.7
1.9
CVSSv2
CVE-2011-1155
The writeState function in logrotate.c in logrotate 3.7.9 and previous versions might allow context-dependent malicious users to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that...
Gentoo Logrotate 3.7.1
Gentoo Logrotate 3.6.5
Gentoo Logrotate 3.7.8
Gentoo Logrotate 3.7
Gentoo Logrotate 3.5.9
Gentoo Logrotate
Gentoo Logrotate 3.7.6
Gentoo Logrotate 3.3
Gentoo Logrotate 3.7.2
Gentoo Logrotate 3.7.7
6.9
CVSSv2
CVE-2011-1154
The shred_file function in logrotate.c in logrotate 3.7.9 and previous versions might allow context-dependent malicious users to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of ...
Gentoo Logrotate 3.7.1
Gentoo Logrotate 3.7.6
Gentoo Logrotate 3.5.9
Gentoo Logrotate 3.3
Gentoo Logrotate 3.6.5
Gentoo Logrotate 3.7.8
Gentoo Logrotate 3.7
Gentoo Logrotate
Gentoo Logrotate 3.7.2
Gentoo Logrotate 3.7.7
6.3
CVSSv2
CVE-2011-1550
The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted d...
Gentoo Logrotate
6.3
CVSSv2
CVE-2011-1548
The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted direct...
Gentoo Logrotate
6.3
CVSSv2
CVE-2011-1549
The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directorie...
Gentoo Logrotate
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started