The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate’s lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=606544
openwall.com/lists/oss-security/2011/03/04/16
openwall.com/lists/oss-security/2011/03/04/17
openwall.com/lists/oss-security/2011/03/04/18
openwall.com/lists/oss-security/2011/03/04/19
openwall.com/lists/oss-security/2011/03/04/22
openwall.com/lists/oss-security/2011/03/04/24
openwall.com/lists/oss-security/2011/03/04/25
openwall.com/lists/oss-security/2011/03/04/26
openwall.com/lists/oss-security/2011/03/04/27
openwall.com/lists/oss-security/2011/03/04/28
openwall.com/lists/oss-security/2011/03/04/29
openwall.com/lists/oss-security/2011/03/04/30
openwall.com/lists/oss-security/2011/03/04/31
openwall.com/lists/oss-security/2011/03/04/32
openwall.com/lists/oss-security/2011/03/04/33
openwall.com/lists/oss-security/2011/03/05/4
openwall.com/lists/oss-security/2011/03/05/6
openwall.com/lists/oss-security/2011/03/05/8
openwall.com/lists/oss-security/2011/03/06/3
openwall.com/lists/oss-security/2011/03/06/4
openwall.com/lists/oss-security/2011/03/06/5
openwall.com/lists/oss-security/2011/03/06/6
openwall.com/lists/oss-security/2011/03/07/11
openwall.com/lists/oss-security/2011/03/07/5
openwall.com/lists/oss-security/2011/03/07/6
openwall.com/lists/oss-security/2011/03/08/5
openwall.com/lists/oss-security/2011/03/10/2
openwall.com/lists/oss-security/2011/03/10/3
openwall.com/lists/oss-security/2011/03/10/6
openwall.com/lists/oss-security/2011/03/10/7
openwall.com/lists/oss-security/2011/03/11/3
openwall.com/lists/oss-security/2011/03/11/5
openwall.com/lists/oss-security/2011/03/14/26
openwall.com/lists/oss-security/2011/03/23/11
www.securityfocus.com/bid/47167