Vulnerability Database

322,905

Total vulnerabilities in the database

CVE-2011-1548

The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.

  • Published: Mar 30, 2011
  • Updated: Nov 9, 2025
  • CVE: CVE-2011-1548
  • Severity: Medium
  • Exploit:

CVSS v2:

  • Severity: Medium
  • Score: 6.3
  • AV:L/AC:M/Au:N/C:N/I:C/A:C

CWEs:

Software From Fixed in
gentoo / logrotate - -