A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{ "vanir_signatures": [ { "id": "CVE-2021-35938-6ff8734b", "source": "https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033", "deprecated": false, "signature_version": "v1", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "280623155716057075973965713759273863140", "67026450021903754845164842287235129457", "158411457487267255824690252833708700168" ] }, "target": { "file": "lib/fsm.c" } }, { "id": "CVE-2021-35938-c3afe85b", "source": "https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033", "deprecated": false, "signature_version": "v1", "signature_type": "Function", "digest": { "length": 5307.0, "function_hash": "106619841970814527190268285391749306210" }, "target": { "file": "lib/fsm.c", "function": "rpmPackageFilesInstall" } } ] }