Описание
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | not-affected | |
hardy | ignored | end of life |
jaunty | ignored | end of life |
karmic | ignored | end of life |
lucid | ignored | end of life |
maverick | ignored | end of life, was needed |
natty | not-affected | 4.8.1-6ubuntu1 |
oneiric | not-affected | |
upstream | released | 4.8.1-6 |
Показывать по
Ссылки на источники
7.2 High
CVSS2
Связанные уязвимости
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and R ...
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
ELSA-2010-0679: rpm security and bug fix update (MODERATE)
7.2 High
CVSS2