CVE-2022-1348: CWE-732 in logrotate
A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any rotation. This flaw affects logrotate versions before 3.20.0.
AI Analysis
Technical Summary
CVE-2022-1348 is a security vulnerability identified in the logrotate utility, specifically affecting versions prior to 3.20.0. Logrotate is a widely used system utility on Unix-like operating systems responsible for managing log files by rotating, compressing, and removing them to prevent disk space exhaustion. The vulnerability arises from improper handling of the state file, which logrotate uses to coordinate and prevent concurrent executions by acquiring a file lock. When the state file does not exist, logrotate creates it with world-readable permissions. This misconfiguration allows any unprivileged user to acquire the lock on the state file, effectively blocking other instances of logrotate from running. As a result, legitimate log rotation processes can be denied execution, leading to log files growing indefinitely. This can cause disk space exhaustion and potentially disrupt system monitoring and auditing processes. The vulnerability is classified under CWE-732 (Incorrect Permission Assignment for Critical Resource), indicating that the issue stems from insecure default permissions on a critical synchronization file. The CVSS v3.1 base score is 6.5 (medium severity), reflecting that the vulnerability requires network access with low complexity, privileges, and no user interaction, and impacts availability but not confidentiality or integrity. There are no known exploits in the wild at the time of publication, and no vendor patches were linked in the provided data, though it is expected that updated logrotate versions (3.20.0 and later) address this issue.
Potential Impact
For European organizations, this vulnerability can have significant operational impacts. Logrotate is a fundamental component in many Linux-based systems, which are prevalent in enterprise servers, cloud infrastructure, and critical services across Europe. Exploitation allows an unprivileged user to prevent log rotation, causing log files to grow unchecked. This can lead to disk space exhaustion, potentially causing system instability, application failures, or denial of service conditions. Moreover, the inability to rotate logs can hinder forensic investigations and compliance with data retention policies, impacting regulatory adherence such as GDPR. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact can disrupt business operations and critical infrastructure. Organizations with multi-user environments or shared hosting platforms are particularly at risk, as unprivileged users may exploit this to degrade service availability.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first ensure that all systems running logrotate are updated to version 3.20.0 or later, where the issue is resolved by correcting the permissions on the state file. If immediate upgrading is not feasible, administrators should manually verify and correct the permissions of the logrotate state file to restrict access to privileged users only (e.g., root). Implementing file system access controls such as SELinux or AppArmor policies to restrict unprivileged user access to the logrotate state file can provide additional protection. Monitoring disk usage and setting alerts for abnormal log file growth can help detect exploitation attempts early. Additionally, restricting unprivileged user access on critical systems and employing least privilege principles reduce the attack surface. Regular auditing of system utilities and their configurations should be part of security hygiene to prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-1348: CWE-732 in logrotate
Description
A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any rotation. This flaw affects logrotate versions before 3.20.0.
AI-Powered Analysis
Technical Analysis
CVE-2022-1348 is a security vulnerability identified in the logrotate utility, specifically affecting versions prior to 3.20.0. Logrotate is a widely used system utility on Unix-like operating systems responsible for managing log files by rotating, compressing, and removing them to prevent disk space exhaustion. The vulnerability arises from improper handling of the state file, which logrotate uses to coordinate and prevent concurrent executions by acquiring a file lock. When the state file does not exist, logrotate creates it with world-readable permissions. This misconfiguration allows any unprivileged user to acquire the lock on the state file, effectively blocking other instances of logrotate from running. As a result, legitimate log rotation processes can be denied execution, leading to log files growing indefinitely. This can cause disk space exhaustion and potentially disrupt system monitoring and auditing processes. The vulnerability is classified under CWE-732 (Incorrect Permission Assignment for Critical Resource), indicating that the issue stems from insecure default permissions on a critical synchronization file. The CVSS v3.1 base score is 6.5 (medium severity), reflecting that the vulnerability requires network access with low complexity, privileges, and no user interaction, and impacts availability but not confidentiality or integrity. There are no known exploits in the wild at the time of publication, and no vendor patches were linked in the provided data, though it is expected that updated logrotate versions (3.20.0 and later) address this issue.
Potential Impact
For European organizations, this vulnerability can have significant operational impacts. Logrotate is a fundamental component in many Linux-based systems, which are prevalent in enterprise servers, cloud infrastructure, and critical services across Europe. Exploitation allows an unprivileged user to prevent log rotation, causing log files to grow unchecked. This can lead to disk space exhaustion, potentially causing system instability, application failures, or denial of service conditions. Moreover, the inability to rotate logs can hinder forensic investigations and compliance with data retention policies, impacting regulatory adherence such as GDPR. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact can disrupt business operations and critical infrastructure. Organizations with multi-user environments or shared hosting platforms are particularly at risk, as unprivileged users may exploit this to degrade service availability.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first ensure that all systems running logrotate are updated to version 3.20.0 or later, where the issue is resolved by correcting the permissions on the state file. If immediate upgrading is not feasible, administrators should manually verify and correct the permissions of the logrotate state file to restrict access to privileged users only (e.g., root). Implementing file system access controls such as SELinux or AppArmor policies to restrict unprivileged user access to the logrotate state file can provide additional protection. Monitoring disk usage and setting alerts for abnormal log file growth can help detect exploitation attempts early. Additionally, restricting unprivileged user access on critical systems and employing least privilege principles reduce the attack surface. Regular auditing of system utilities and their configurations should be part of security hygiene to prevent similar issues.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2022-04-13T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f5e1b0bd07c3938fae5
Added to database: 6/10/2025, 6:54:22 PM
Last enriched: 7/10/2025, 7:32:26 PM
Last updated: 2/4/2026, 8:11:02 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67851: Improper Neutralization of Formula Elements in a CSV File
MediumCVE-2026-24774: CWE-841: Improper Enforcement of Behavioral Workflow in gunet openeclass
MediumCVE-2026-24773: CWE-639: Authorization Bypass Through User-Controlled Key in gunet openeclass
HighCVE-2026-24674: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gunet openeclass
MediumCVE-2026-24673: CWE-434: Unrestricted Upload of File with Dangerous Type in gunet openeclass
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.