First published: Sun Feb 27 2011(Updated: )
A shell command injection flaw was found in the way the logrotate utility handled shred configuration directive (intended to ensure the log files are not readable after their scheduled deletion). A local attacker could use this flaw to execute arbitrary system commands (if the logrotate was run under privileged system user account, root) when the logrotate utility was run on a log file, within attacker controllable directory.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Logrotate | =3.6.5 | |
Gentoo Logrotate | =3.7.8 | |
Gentoo Logrotate | =3.5.9-r1 | |
Gentoo Logrotate | =3.7.6 | |
Gentoo Logrotate | =3.3-r2 | |
Gentoo Logrotate | =3.7.2 | |
Gentoo Logrotate | =3.7 | |
Gentoo Logrotate | =3.7.1-r2 | |
Gentoo Logrotate | =3.6.5-r1 | |
Gentoo Logrotate | =3.5.9 | |
Gentoo Logrotate | =3.7.1-r1 | |
Gentoo Logrotate | <=3.7.9 | |
Gentoo Logrotate | =3.7.1 | |
Gentoo Logrotate | =3.7.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.