CVE-2022-1348Incorrect Permission Assignment in Project Logrotate

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 70.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 25
Latest updateFeb 15

Description

A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any rotation. This flaw affects logrotate versions before 3.20.0.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages10 packages

debiandebian/logrotate< logrotate 3.20.1-1 (bookworm)
NVDlogrotate_project/logrotate3.17.03.20.0
Debianlogrotate_project/logrotate< 3.18.0-2+deb11u1+3
CVEListV5logrotate_project/logrotatelogrotate versions before 3.20.0

Also affects: Fedora 35, 36

Patches

🔴Vulnerability Details

2
GHSA
GHSA-4c4j-w8hm-rjgv: A vulnerability was found in logrotate in how the state file is created2022-05-26
OSV
CVE-2022-1348: A vulnerability was found in logrotate in how the state file is created2022-05-25

📋Vendor Advisories

5
CISA ICS
Siemens SCALANCE XCM-/XRM-3002024-02-15
Ubuntu
logrotate vulnerability2022-05-26
Red Hat
logrotate: potential DoS from unprivileged users via the state file2022-05-25
Microsoft
A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock2022-05-10
Debian
CVE-2022-1348: logrotate - A vulnerability was found in logrotate in how the state file is created. The sta...2022