Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-35937

Опубликовано: 25 авг. 2022
Источник: debian

Описание

A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rpmfixed4.18.0+dfsg-1package
rpmignoredbookwormpackage
rpmignoredbullseyepackage
rpmignoredbusterpackage
rpmno-dsastretchpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1964125

Связанные уязвимости

CVSS3: 6.4
ubuntu
почти 3 года назад

A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.3
redhat
около 4 лет назад

A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.4
nvd
почти 3 года назад

A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.4
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 6.4
github
почти 3 года назад

A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.