A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any rotation. This flaw affects logrotate versions before 3.20.0.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Logrotate | Logrotate_project | 3.17.0 (including) | 3.20.0 (excluding) |
Logrotate | Ubuntu | impish | * |
Logrotate | Ubuntu | jammy | * |
Logrotate | Ubuntu | kinetic | * |
Red Hat Enterprise Linux 9 | RedHat | logrotate-0:3.18.0-7.el9 | * |