First published: Sun Feb 27 2011(Updated: )
It was found that logrotate utility used insecure default permissions, when creating of new files (time-of-check, time-of-use, TOCTOU race condition). In some specific configurations, a local attacker could use this flaw to open the new file before the final permissions have been applied, leading to disclosure of sensitive information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Logrotate | =3.6.5 | |
Gentoo Logrotate | =3.7.8 | |
Gentoo Logrotate | =3.5.9-r1 | |
Gentoo Logrotate | =3.7.6 | |
Gentoo Logrotate | =3.3-r2 | |
Gentoo Logrotate | =3.7.2 | |
Gentoo Logrotate | =3.7 | |
Gentoo Logrotate | =3.7.1-r2 | |
Gentoo Logrotate | =3.6.5-r1 | |
Gentoo Logrotate | =3.5.9 | |
Gentoo Logrotate | =3.7.1-r1 | |
Gentoo Logrotate | <=3.7.9 | |
Gentoo Logrotate | =3.7.1 | |
Gentoo Logrotate | =3.7.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.