Description
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
CVSS Metrics
- Vector
- AV:L/AC:L/Au:N/C:C/I:C/A:C
- Access Vector
- local
- Access Cmplx
- low
- Auth
- none
- Confidentiality
- complete
- Integrity
- complete
- Availability
- complete
- Weaknesses
- CWE-264
Metadata
- Primary Vendor
- RPM
- Published
- 6/8/2010
- Last Modified
- 4/11/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
rpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpm
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.