{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2011-1550","title":"Title"},{"category":"description","text":"The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories for the (1) cobbler, (2) inn, (3) safte-monitor, and (4) uucp packages.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2011-1550","url":"https://www.suse.com/security/cve/CVE-2011-1550"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 677335 for CVE-2011-1550","url":"https://bugzilla.suse.com/677335"},{"category":"external","summary":"SUSE Bug 678433 for CVE-2011-1550","url":"https://bugzilla.suse.com/678433"},{"category":"external","summary":"Advisory link for SUSE-OU-2019:0884-1","url":"https://lists.suse.com/pipermail/sle-updates/2019-April/011156.html"},{"category":"external","summary":"Advisory link for SUSE-RU-2012:0327-1","url":"https://lists.suse.com/pipermail/sle-updates/2012-March/000129.html"},{"category":"external","summary":"Advisory link for SUSE-RU-2019:0880-1","url":"https://lists.suse.com/pipermail/sle-updates/2019-April/011150.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2012:0509-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2012-April/000083.html"}],"title":"SUSE CVE CVE-2011-1550","tracking":{"current_release_date":"2025-04-25T13:52:16Z","generator":{"date":"2023-02-15T05:53:35Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2011-1550","initial_release_date":"2023-02-15T05:53:35Z","revision_history":[{"date":"2023-02-15T05:53:35Z","number":"2","summary":"Current version"},{"date":"2024-02-21T04:59:00Z","number":"3","summary":"Current version"},{"date":"2024-10-11T06:15:44Z","number":"4","summary":"Current version"},{"date":"2025-03-16T14:21:25Z","number":"5","summary":"Current version"},{"date":"2025-04-25T13:52:16Z","number":"6","summary":"Current version"}],"status":"interim","version":"6"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"HPE Helion OpenStack 8","product":{"name":"HPE Helion OpenStack 8","product_id":"HPE Helion OpenStack 8","product_identification_helper":{"cpe":"cpe:/o:suse:hpe-helion-openstack:8"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product":{"name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_identification_helper":{"cpe":"cpe:/o:suse:sles:11:sp1:teradata"}}},{"category":"product_name","name":"SUSE Manager Client Tools Beta for SLE 12","product":{"name":"SUSE Manager Client Tools Beta for SLE 12","product_id":"SUSE Manager Client Tools Beta for SLE 12","product_identification_helper":{"cpe":"cpe:/o:suse:sle-manager-tools-beta:12"}}},{"category":"product_name","name":"SUSE Manager Client Tools for SLE 12","product":{"name":"SUSE Manager Client Tools for SLE 12","product_id":"SUSE Manager Client Tools for SLE 12","product_identification_helper":{"cpe":"cpe:/o:suse:sle-manager-tools:12"}}},{"category":"product_name","name":"SUSE Manager Client Tools for SLE 15","product":{"name":"SUSE Manager Client Tools for SLE 15","product_id":"SUSE Manager Client Tools for SLE 15","product_identification_helper":{"cpe":"cpe:/o:suse:sle-manager-tools:15"}}},{"category":"product_name","name":"SUSE Manager Server 1.2","product":{"name":"SUSE Manager Server 1.2","product_id":"SUSE Manager Server 1.2","product_identification_helper":{"cpe":"cpe:/o:suse:suse-manager-server:1.2"}}},{"category":"product_name","name":"SUSE OpenStack Cloud 8","product":{"name":"SUSE OpenStack Cloud 8","product_id":"SUSE OpenStack Cloud 8","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud:8"}}},{"category":"product_name","name":"SUSE OpenStack Cloud 9","product":{"name":"SUSE OpenStack Cloud 9","product_id":"SUSE OpenStack Cloud 9","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud:9"}}},{"category":"product_version","name":"cobbler","product":{"name":"cobbler","product_id":"cobbler","product_identification_helper":{"cpe":"cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/cobbler@?upstream=cobbler.src.rpm"}}},{"category":"product_version","name":"koan","product":{"name":"koan","product_id":"koan","product_identification_helper":{"purl":"pkg:rpm/suse/koan@?upstream=koan.src.rpm"}}},{"category":"product_version","name":"logrotate-3.7.7-10.26.1","product":{"name":"logrotate-3.7.7-10.26.1","product_id":"logrotate-3.7.7-10.26.1","product_identification_helper":{"cpe":"cpe:2.3:a:gentoo:logrotate:3.7.7:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/logrotate@3.7.7-10.26.1?upstream=logrotate-3.7.7-10.26.1.src.rpm"}}},{"category":"product_version","name":"mgr-osad","product":{"name":"mgr-osad","product_id":"mgr-osad","product_identification_helper":{"purl":"pkg:rpm/suse/mgr-osad@?upstream=mgr-osad.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"logrotate-3.7.7-10.26.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:logrotate-3.7.7-10.26.1"},"product_reference":"logrotate-3.7.7-10.26.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"cobbler as component of HPE Helion OpenStack 8","product_id":"HPE Helion OpenStack 8:cobbler"},"product_reference":"cobbler","relates_to_product_reference":"HPE Helion OpenStack 8"},{"category":"default_component_of","full_product_name":{"name":"mgr-osad as component of SUSE Manager Client Tools Beta for SLE 12","product_id":"SUSE Manager Client Tools Beta for SLE 12:mgr-osad"},"product_reference":"mgr-osad","relates_to_product_reference":"SUSE Manager Client Tools Beta for SLE 12"},{"category":"default_component_of","full_product_name":{"name":"cobbler as component of SUSE Manager Client Tools for SLE 12","product_id":"SUSE Manager Client Tools for SLE 12:cobbler"},"product_reference":"cobbler","relates_to_product_reference":"SUSE Manager Client Tools for SLE 12"},{"category":"default_component_of","full_product_name":{"name":"mgr-osad as component of SUSE Manager Client Tools for SLE 12","product_id":"SUSE Manager Client Tools for SLE 12:mgr-osad"},"product_reference":"mgr-osad","relates_to_product_reference":"SUSE Manager Client Tools for SLE 12"},{"category":"default_component_of","full_product_name":{"name":"koan as component of SUSE Manager Client Tools for SLE 15","product_id":"SUSE Manager Client Tools for SLE 15:koan"},"product_reference":"koan","relates_to_product_reference":"SUSE Manager Client Tools for SLE 15"},{"category":"default_component_of","full_product_name":{"name":"mgr-osad as component of SUSE Manager Client Tools for SLE 15","product_id":"SUSE Manager Client Tools for SLE 15:mgr-osad"},"product_reference":"mgr-osad","relates_to_product_reference":"SUSE Manager Client Tools for SLE 15"},{"category":"default_component_of","full_product_name":{"name":"cobbler as component of SUSE Manager Server 1.2","product_id":"SUSE Manager Server 1.2:cobbler"},"product_reference":"cobbler","relates_to_product_reference":"SUSE Manager Server 1.2"},{"category":"default_component_of","full_product_name":{"name":"cobbler as component of SUSE OpenStack Cloud 8","product_id":"SUSE OpenStack Cloud 8:cobbler"},"product_reference":"cobbler","relates_to_product_reference":"SUSE OpenStack Cloud 8"},{"category":"default_component_of","full_product_name":{"name":"cobbler as component of SUSE OpenStack Cloud 9","product_id":"SUSE OpenStack Cloud 9:cobbler"},"product_reference":"cobbler","relates_to_product_reference":"SUSE OpenStack Cloud 9"}]},"vulnerabilities":[{"cve":"CVE-2011-1550","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-1550"}],"notes":[{"category":"general","text":"The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories for the (1) cobbler, (2) inn, (3) safte-monitor, and (4) uucp packages.","title":"CVE description"}],"product_status":{"known_affected":["SUSE Manager Client Tools Beta for SLE 12:mgr-osad","SUSE Manager Client Tools for SLE 12:mgr-osad","SUSE Manager Client Tools for SLE 15:mgr-osad","SUSE Manager Server 1.2:cobbler"],"known_not_affected":["HPE Helion OpenStack 8:cobbler","SUSE Manager Client Tools for SLE 12:cobbler","SUSE Manager Client Tools for SLE 15:koan","SUSE OpenStack Cloud 8:cobbler","SUSE OpenStack Cloud 9:cobbler"],"recommended":["SUSE Linux Enterprise Server 11 SP1-TERADATA:logrotate-3.7.7-10.26.1"]},"references":[{"category":"external","summary":"CVE-2011-1550","url":"https://www.suse.com/security/cve/CVE-2011-1550"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 677335 for CVE-2011-1550","url":"https://bugzilla.suse.com/677335"},{"category":"external","summary":"SUSE Bug 678433 for CVE-2011-1550","url":"https://bugzilla.suse.com/678433"},{"category":"external","summary":"Advisory link for SUSE-OU-2019:0884-1","url":"https://lists.suse.com/pipermail/sle-updates/2019-April/011156.html"},{"category":"external","summary":"Advisory link for SUSE-RU-2012:0327-1","url":"https://lists.suse.com/pipermail/sle-updates/2012-March/000129.html"},{"category":"external","summary":"Advisory link for SUSE-RU-2019:0880-1","url":"https://lists.suse.com/pipermail/sle-updates/2019-April/011150.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2012:0509-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2012-April/000083.html"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-TERADATA:logrotate-3.7.7-10.26.1"]}],"threats":[{"category":"impact","date":"2013-06-28T05:51:00Z","details":"moderate"}],"title":"CVE-2011-1550"}]}