CVE-2021-35938
Summary
| CVE | CVE-2021-35938 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-08-25 20:15:00 UTC |
| Updated | 2022-11-29 18:06:00 UTC |
| Description | A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Set file metadata via fd-based ops for everything but symlinks · rpm-software-management/rpm@25a435e · GitHub |
MISC |
github.com |
|
| rpm.org - Releases |
MISC |
rpm.org |
|
| Bug 1157880 – VUL-0: CVE-2021-35938: rpm: races with chown/chmod/capabilties calls during installation |
MISC |
bugzilla.suse.com |
|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| 1964114 – (CVE-2021-35938) CVE-2021-35938 rpm: races with chown/chmod/capabilities calls during installation |
MISC |
bugzilla.redhat.com |
|
| RPM: Multiple Vulnerabilities (GLSA 202210-22) — Gentoo security |
GENTOO |
security.gentoo.org |
|
| First steps towards fixing the symlink CVEs by pmatilai · Pull Request #1919 · rpm-software-management/rpm · GitHub |
MISC |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 161314 Oracle Enterprise Linux Security Update for rpm (ELSA-2024-0463)
- 161331 Oracle Enterprise Linux Security Update for rpm (ELSA-2024-0647)
- 182103 Debian Security Update for rpm (CVE-2021-35938)
- 242744 Red Hat Update for rpm (RHSA-2024:0424)
- 242754 Red Hat Update for rpm (RHSA-2024:0463)
- 242757 Red Hat Update for rpm (RHSA-2024:0435)
- 242810 Red Hat Update for rpm (RHSA-2024:0582)
- 242816 Red Hat Update for rpm (RHSA-2024:0647)
- 242842 Red Hat Update for rpm (RHSA-2024:0453)
- 357349 Amazon Linux Security Advisory for rpm : ALAS2023-2024-573
- 379634 Alibaba Cloud Linux Security Update for rpm (ALINUX3-SA-2024:0030)
- 502949 Alpine Linux Security Update for rpm
- 505818 Alpine Linux Security Update for rpm
- 672363 EulerOS Security Update for rpm (EulerOS-SA-2022-2741)
- 672374 EulerOS Security Update for rpm (EulerOS-SA-2022-2776)
- 672457 EulerOS Security Update for rpm (EulerOS-SA-2022-2829)
- 672471 EulerOS Security Update for rpm (EulerOS-SA-2022-2855)
- 691000 Free Berkeley Software Distribution (FreeBSD) Security Update for rpm4 (0c52abde-717b-11ed-98ca-40b034429ecf)
- 710651 Gentoo Linux RPM Multiple Vulnerabilities (GLSA 202210-22)
- 903712 Common Base Linux Mariner (CBL-Mariner) Security Update for rpm (10726)
- 903790 Common Base Linux Mariner (CBL-Mariner) Security Update for rpm (10723)
- 904163 Common Base Linux Mariner (CBL-Mariner) Security Update for rpm (10723-1)
- 941549 AlmaLinux Security Update for rpm (ALSA-2024:0463)
- 941568 AlmaLinux Security Update for rpm (ALSA-2024:0647)
- 961111 Rocky Linux Security Update for rpm (RLSA-2024:0647)