vulnerability

CentOS Linux: CVE-2021-35938: Moderate: rpm security update (CESA-2024:0463)

Severity
7
CVSS
(AV:L/AC:L/Au:M/C:C/I:C/A:C)
Published
Aug 25, 2022
Added
Jan 26, 2024
Modified
Jan 28, 2025

Description

A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Solution(s)

centos-upgrade-python3-rpmcentos-upgrade-python3-rpm-debuginfocentos-upgrade-rpmcentos-upgrade-rpm-apidocscentos-upgrade-rpm-buildcentos-upgrade-rpm-build-debuginfocentos-upgrade-rpm-build-libscentos-upgrade-rpm-build-libs-debuginfocentos-upgrade-rpm-croncentos-upgrade-rpm-debuginfocentos-upgrade-rpm-debugsourcecentos-upgrade-rpm-develcentos-upgrade-rpm-devel-debuginfocentos-upgrade-rpm-libscentos-upgrade-rpm-libs-debuginfocentos-upgrade-rpm-plugin-auditcentos-upgrade-rpm-plugin-audit-debuginfocentos-upgrade-rpm-plugin-fapolicydcentos-upgrade-rpm-plugin-fapolicyd-debuginfocentos-upgrade-rpm-plugin-imacentos-upgrade-rpm-plugin-ima-debuginfocentos-upgrade-rpm-plugin-prioreset-debuginfocentos-upgrade-rpm-plugin-selinuxcentos-upgrade-rpm-plugin-selinux-debuginfocentos-upgrade-rpm-plugin-syslogcentos-upgrade-rpm-plugin-syslog-debuginfocentos-upgrade-rpm-plugin-systemd-inhibitcentos-upgrade-rpm-plugin-systemd-inhibit-debuginfocentos-upgrade-rpm-signcentos-upgrade-rpm-sign-debuginfocentos-upgrade-rpm-sign-libscentos-upgrade-rpm-sign-libs-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.