CVE-2021-35938
rpm: races with chown/chmod/capabilities calls during installation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Se ha encontrado un problema de enlaces simbólicos en rpm. Es producido cuando rpm establece los permisos y credenciales deseados después de instalar un archivo. Un usuario local no privilegiado podría usar este fallo para cambiar el archivo original por un enlace simbólico a un archivo crítico para la seguridad y escalar sus privilegios en el sistema. La mayor amenaza de esta vulnerabilidad es para la confidencialidad e integridad de los datos, así como para la disponibilidad del sistema.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-06-29 CVE Reserved
- 2022-08-25 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-11-16 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://rpm.org/wiki/Releases/4.18.0 | Release Notes |
URL | Date | SRC |
---|---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1157880 | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033 | 2022-11-29 | |
https://github.com/rpm-software-management/rpm/pull/1919 | 2022-11-29 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2021-35938 | 2022-11-29 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1964114 | 2022-11-29 | |
https://security.gentoo.org/glsa/202210-22 | 2022-11-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rpm Search vendor "Rpm" | Rpm Search vendor "Rpm" for product "Rpm" | < 4.18.0 Search vendor "Rpm" for product "Rpm" and version " < 4.18.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 34 Search vendor "Fedoraproject" for product "Fedora" and version "34" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 7.0 Search vendor "Redhat" for product "Enterprise Linux" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 9.0 Search vendor "Redhat" for product "Enterprise Linux" and version "9.0" | - |
Affected
|