The groonga-httpd package 6.1.5-1 for Debian sets the /var/log/groonga ownership to the groonga account, which might let local users obtain root access because of unsafe interaction with logrotate. For example, an attacker can exploit a race condition to insert a symlink from /var/log/groonga/httpd to /etc/bash_completion.d. NOTE: this is an issue in the Debian packaging of the Groonga HTTP server.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:03:32.011Z

Reserved: 2019-05-02T00:00:00

Link: CVE-2019-11675

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-02T06:29:00.190

Modified: 2024-11-21T04:21:34.167

Link: CVE-2019-11675

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.