CVE-2021-35939Link Following in RPM

CWE-59Link Following7 documents7 sources
Severity
6.7MEDIUMNVD
CNA7.3OSV7.8
EPSS
0.2%
top 57.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 26
Latest updateAug 27

Description

It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages3 packages

NVDrpm/rpm< 4.18
Debianrpm/rpm< 4.18.0+dfsg-1+2
CVEListV5rpm/rpmFixed in RPM-v4.18

Also affects: Enterprise Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-prgv-w33h-5m73: It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to b2022-08-27
CVEList
CVE-2021-35939: It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to b2022-08-26
OSV
CVE-2021-35939: It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to b2022-08-26

📋Vendor Advisories

3
Microsoft
It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns anot2022-08-09
Red Hat
rpm: checks for unsafe symlinks are not performed for intermediary directories2021-06-30
Debian
CVE-2021-35939: rpm - It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: th...2021
CVE-2021-35939 — Link Following in RPM | cvebase