It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://rpm.org/wiki/Releases/4.18.0 | release notes vendor advisory |
https://github.com/rpm-software-management/rpm/pull/1919 | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1964129 | issue tracking exploit third party advisory |
https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556 | third party advisory patch |
https://access.redhat.com/security/cve/CVE-2021-35939 | third party advisory |
https://security.gentoo.org/glsa/202210-22 | third party advisory vendor advisory |