Количество 11
Количество 11
CVE-2017-7500
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
CVE-2017-7500
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
CVE-2017-7500
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
CVE-2017-7500
It was found that rpm did not properly handle RPM installations when a ...
openSUSE-SU-2018:2215-1
Security update for rpm
SUSE-SU-2018:2073-1
Security update for rpm
GHSA-2jc3-8rq8-7x2x
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
openSUSE-SU-2018:3373-1
Security update for rpm
SUSE-SU-2018:3884-2
Security update for rpm
SUSE-SU-2018:3884-1
Security update for rpm
SUSE-SU-2018:3286-1
Security update for rpm
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2017-7500 It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege. | CVSS3: 7.3 | 0% Низкий | больше 7 лет назад | |
CVE-2017-7500 It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege. | CVSS3: 7.3 | 0% Низкий | больше 8 лет назад | |
CVE-2017-7500 It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege. | CVSS3: 7.3 | 0% Низкий | больше 7 лет назад | |
CVE-2017-7500 It was found that rpm did not properly handle RPM installations when a ... | CVSS3: 7.3 | 0% Низкий | больше 7 лет назад | |
openSUSE-SU-2018:2215-1 Security update for rpm | 0% Низкий | больше 7 лет назад | ||
SUSE-SU-2018:2073-1 Security update for rpm | 0% Низкий | больше 7 лет назад | ||
GHSA-2jc3-8rq8-7x2x It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
openSUSE-SU-2018:3373-1 Security update for rpm | больше 7 лет назад | |||
SUSE-SU-2018:3884-2 Security update for rpm | почти 7 лет назад | |||
SUSE-SU-2018:3884-1 Security update for rpm | около 7 лет назад | |||
SUSE-SU-2018:3286-1 Security update for rpm | больше 7 лет назад |
Уязвимостей на страницу