Summary: | <app-admin/logrotate-3.7.9-r1: multiple vulnerabilities (CVE-2011-{1098,1154,1155}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Paweł Hajdan, Jr. (RETIRED) <phajdan.jr> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | dang, nimiux, pavel.labushev |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | A1 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 357275 |
Description
Paweł Hajdan, Jr. (RETIRED)
![]() Rating A1 because of possible shell command injection (https://bugzilla.redhat.com/show_bug.cgi?id=680796). FYI, there are ebuilds and eclasses that create user/group-writable directories in /var/log and enable logrotate to handle the log files there. dev-db/mysql (mysql.eclass) and media-sound/murmur, for example. I've added app-admin/logrotate-3.7.9-r1 with the patches from the tree upstream bugs that were not closed as "NOTABUG". These correspond to CVE-2011-1154, CVE-2011-1098 and CVE-2011-1155 (which includes the shell injection). RedHat classified this update as "Moderate". (In reply to comment #3) > I've added app-admin/logrotate-3.7.9-r1 with the patches from the tree upstream > bugs that were not closed as "NOTABUG". Great, thanks. Arches, please test and mark stable: =app-admin/logrotate-3.7.9-r1 Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86" Stable for HPPA. x86 stable. Thanks amd64 done ppc done ppc64/ia64 stable alpha/arm/s390/sh/sparc stable Thanks, folks. GLSA request filed. CVE-2011-1155 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1155): The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name. CVE-2011-1154 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1154): The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name. CVE-2011-1098 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1098): Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place. app-admin/logrotate-3.7.9-r1 is no longer in the tree. Can this bug be closed?. Thanks. (In reply to comment #13) > > Can this bug be closed?. Thanks. Hi, Chema, no. We need to publish a GLSA before the bug can be closed. This issue was resolved and addressed in GLSA 201206-36 at http://security.gentoo.org/glsa/glsa-201206-36.xml by GLSA coordinator Stefan Behte (craig). |