CVE-2010-2059

lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
References
Link Resource
http://distrib-coffee.ipsl.jussieu.fr/pub/mirrors/rpm/files/rpm/rpm-4.4/rpm-4.4.3.tar.gz Patch
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://lists.vmware.com/pipermail/security-announce/2011/000126.html
http://marc.info/?l=oss-security&m=127559059928131&w=2
http://rpm.org/gitweb?p=rpm.git%3Ba=commit%3Bh=ca2d6b2b484f1501eafdde02e1688409340d2383
http://secunia.com/advisories/40028 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:180
http://www.openwall.com/lists/oss-security/2010/06/02/2
http://www.openwall.com/lists/oss-security/2010/06/02/3
http://www.openwall.com/lists/oss-security/2010/06/03/5
http://www.openwall.com/lists/oss-security/2010/06/04/1
http://www.osvdb.org/65143
http://www.redhat.com/support/errata/RHSA-2010-0679.html
http://www.securityfocus.com/archive/1/516909/100/0/threaded
http://www.vmware.com/security/advisories/VMSA-2011-0004.html
http://www.vupen.com/english/advisories/2011/0606
https://bugzilla.redhat.com/show_bug.cgi?id=125517
https://bugzilla.redhat.com/show_bug.cgi?id=598775
http://distrib-coffee.ipsl.jussieu.fr/pub/mirrors/rpm/files/rpm/rpm-4.4/rpm-4.4.3.tar.gz Patch
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://lists.vmware.com/pipermail/security-announce/2011/000126.html
http://marc.info/?l=oss-security&m=127559059928131&w=2
http://rpm.org/gitweb?p=rpm.git%3Ba=commit%3Bh=ca2d6b2b484f1501eafdde02e1688409340d2383
http://secunia.com/advisories/40028 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:180
http://www.openwall.com/lists/oss-security/2010/06/02/2
http://www.openwall.com/lists/oss-security/2010/06/02/3
http://www.openwall.com/lists/oss-security/2010/06/03/5
http://www.openwall.com/lists/oss-security/2010/06/04/1
http://www.osvdb.org/65143
http://www.redhat.com/support/errata/RHSA-2010-0679.html
http://www.securityfocus.com/archive/1/516909/100/0/threaded
http://www.vmware.com/security/advisories/VMSA-2011-0004.html
http://www.vupen.com/english/advisories/2011/0606
https://bugzilla.redhat.com/show_bug.cgi?id=125517
https://bugzilla.redhat.com/show_bug.cgi?id=598775
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.2\/a:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2..4.10:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.3.10:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.3.11:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.9:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.11:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.12:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.6.7:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.0.:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.4.2.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:rpm:rpm:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.7.0:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.7.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.7.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:15

Type Values Removed Values Added
References () http://distrib-coffee.ipsl.jussieu.fr/pub/mirrors/rpm/files/rpm/rpm-4.4/rpm-4.4.3.tar.gz - Patch () http://distrib-coffee.ipsl.jussieu.fr/pub/mirrors/rpm/files/rpm/rpm-4.4/rpm-4.4.3.tar.gz - Patch
References () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html -
References () http://lists.vmware.com/pipermail/security-announce/2011/000126.html - () http://lists.vmware.com/pipermail/security-announce/2011/000126.html -
References () http://marc.info/?l=oss-security&m=127559059928131&w=2 - () http://marc.info/?l=oss-security&m=127559059928131&w=2 -
References () http://rpm.org/gitweb?p=rpm.git%3Ba=commit%3Bh=ca2d6b2b484f1501eafdde02e1688409340d2383 - () http://rpm.org/gitweb?p=rpm.git%3Ba=commit%3Bh=ca2d6b2b484f1501eafdde02e1688409340d2383 -
References () http://secunia.com/advisories/40028 - Vendor Advisory () http://secunia.com/advisories/40028 - Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:180 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:180 -
References () http://www.openwall.com/lists/oss-security/2010/06/02/2 - () http://www.openwall.com/lists/oss-security/2010/06/02/2 -
References () http://www.openwall.com/lists/oss-security/2010/06/02/3 - () http://www.openwall.com/lists/oss-security/2010/06/02/3 -
References () http://www.openwall.com/lists/oss-security/2010/06/03/5 - () http://www.openwall.com/lists/oss-security/2010/06/03/5 -
References () http://www.openwall.com/lists/oss-security/2010/06/04/1 - () http://www.openwall.com/lists/oss-security/2010/06/04/1 -
References () http://www.osvdb.org/65143 - () http://www.osvdb.org/65143 -
References () http://www.redhat.com/support/errata/RHSA-2010-0679.html - () http://www.redhat.com/support/errata/RHSA-2010-0679.html -
References () http://www.securityfocus.com/archive/1/516909/100/0/threaded - () http://www.securityfocus.com/archive/1/516909/100/0/threaded -
References () http://www.vmware.com/security/advisories/VMSA-2011-0004.html - () http://www.vmware.com/security/advisories/VMSA-2011-0004.html -
References () http://www.vupen.com/english/advisories/2011/0606 - () http://www.vupen.com/english/advisories/2011/0606 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=125517 - () https://bugzilla.redhat.com/show_bug.cgi?id=125517 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=598775 - () https://bugzilla.redhat.com/show_bug.cgi?id=598775 -

Information

Published : 2010-06-08 18:30

Updated : 2024-11-21 01:15


NVD link : CVE-2010-2059

Mitre link : CVE-2010-2059

CVE.ORG link : CVE-2010-2059


JSON object : View

Products Affected

rpm

  • rpm
CWE
CWE-264

Permissions, Privileges, and Access Controls