Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f3f6-q22p-8fh5

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.

lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.

EPSS

Процентиль: 29%
0.001
Низкий

Связанные уязвимости

redhat
около 15 лет назад

lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.

nvd
около 15 лет назад

lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.

debian
около 15 лет назад

lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and R ...

oracle-oval
почти 15 лет назад

ELSA-2010-0679: rpm security and bug fix update (MODERATE)

fstec
почти 15 лет назад

Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 29%
0.001
Низкий