Computer Security
[EN] securityvulns.ru no-pyccku


rpm hard links vulnerability
Published:14.09.2010
Source:
SecurityVulns ID:11140
Type:local
Threat Level:
5/10
Description:Race conditions for file spoofing.
Affected:RPM : rpm 4.8
CVE:CVE-2010-2059 (lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.)
 CVE-2005-4889 (lib/fsm.c in RPM before 4.4.3 does not properly reset the metadata of an executable file during deletion of the file in an RPM package removal, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file, a related issue to CVE-2010-2059.)
Original documentdocumentMANDRIVA, [ MDVSA-2010:180 ] rpm (14.09.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod