A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CPE | Name | Operator | Version |
---|---|---|---|
fedora | eq | 34 | |
enterprise_linux | eq | 7.0 | |
enterprise_linux | eq | 8.0 | |
enterprise_linux | eq | 9.0 | |
rpm | lt | 4.18.0 |
access.redhat.com/security/cve/CVE-2021-35938
bugzilla.redhat.com/show_bug.cgi?id=1964114
bugzilla.suse.com/show_bug.cgi?id=1157880
github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033
github.com/rpm-software-management/rpm/pull/1919
rpm.org/wiki/Releases/4.18.0
security.gentoo.org/glsa/202210-22