6.5
CVSSv3

CVE-2022-1348

Published: 25/05/2022 Updated: 07/11/2023
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Summary

A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any rotation. This flaw affects logrotate versions prior to 3.20.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

logrotate project logrotate

fedoraproject fedora 35

fedoraproject fedora 36

Vendor Advisories

Debian Bug report logs - #1011644 logrotate: CVE-2022-1348: potential DoS from unprivileged users via the state file Package: src:logrotate; Maintainer for src:logrotate is Christian Göttsche <cgzones@googlemailcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 25 May 2022 19:51:01 UTC Severity: ...
Synopsis Moderate: logrotate security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for logrotate is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this update as having ...
Synopsis Important: Red Hat OpenShift Data Foundation 4130 security and bug fix update Type/Severity Security Advisory: Important Topic Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4130 on Red Hat Enterprise Linux 9Red Hat ...
A vulnerability was found in logrotate in how the state file is created The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any ...
A vulnerability was found in logrotate in how the state file is created The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any ...
A vulnerability was found in logrotate in how the state file is created The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any ...