lib/fsm.c in RPM 4.8.0 and earlier does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade or deletion of the file in an RPM package removal, which might allow local users to gain privileges or bypass intended access restrictions by creating a hard link to a vulnerable file that has (1) POSIX file capabilities or (2) SELinux context information, a related issue to CVE-2010-2059.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/40028 | third party advisory vendor advisory |
http://marc.info/?l=oss-security&m=127559059928131&w=2 | mailing list |
http://www.osvdb.org/65144 | vdb entry |
http://rpm.org/gitweb?p=rpm.git%3Ba=commit%3Bh=4d172a194addc49851e558ea390d3045894e3230 | |
https://bugzilla.redhat.com/show_bug.cgi?id=598775 | |
http://www.openwall.com/lists/oss-security/2010/06/02/3 | mailing list |
http://www.openwall.com/lists/oss-security/2010/06/03/5 | mailing list |
http://www.openwall.com/lists/oss-security/2010/06/04/1 | mailing list |