lib/fsm.c in RPM 4.8.0 and earlier does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade or deletion of the file in an RPM package removal, which might allow local users to gain privileges or bypass intended access restrictions by creating a hard link to a vulnerable file that has (1) POSIX file capabilities or (2) SELinux context information, a related issue to CVE-2010-2059.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=oss-security&m=127559059928131&w=2 - | |
References | () http://rpm.org/gitweb?p=rpm.git%3Ba=commit%3Bh=4d172a194addc49851e558ea390d3045894e3230 - | |
References | () http://secunia.com/advisories/40028 - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2010/06/02/3 - | |
References | () http://www.openwall.com/lists/oss-security/2010/06/03/5 - | |
References | () http://www.openwall.com/lists/oss-security/2010/06/04/1 - | |
References | () http://www.osvdb.org/65144 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=598775 - |
07 Nov 2023, 02:05
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2010-06-08 18:30
Updated : 2024-11-21 01:16
NVD link : CVE-2010-2198
Mitre link : CVE-2010-2198
CVE.ORG link : CVE-2010-2198
JSON object : View
Products Affected
rpm
- rpm
CWE
CWE-264
Permissions, Privileges, and Access Controls