vulnerability
CentOS Linux: CVE-2021-35938: Moderate: rpm security update (CESA-2024:0463)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:M/C:C/I:C/A:C) | Aug 25, 2022 | Jan 26, 2024 | Jan 28, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:M/C:C/I:C/A:C)
Published
Aug 25, 2022
Added
Jan 26, 2024
Modified
Jan 28, 2025
Description
A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Solution(s)
centos-upgrade-python3-rpmcentos-upgrade-python3-rpm-debuginfocentos-upgrade-rpmcentos-upgrade-rpm-apidocscentos-upgrade-rpm-buildcentos-upgrade-rpm-build-debuginfocentos-upgrade-rpm-build-libscentos-upgrade-rpm-build-libs-debuginfocentos-upgrade-rpm-croncentos-upgrade-rpm-debuginfocentos-upgrade-rpm-debugsourcecentos-upgrade-rpm-develcentos-upgrade-rpm-devel-debuginfocentos-upgrade-rpm-libscentos-upgrade-rpm-libs-debuginfocentos-upgrade-rpm-plugin-auditcentos-upgrade-rpm-plugin-audit-debuginfocentos-upgrade-rpm-plugin-fapolicydcentos-upgrade-rpm-plugin-fapolicyd-debuginfocentos-upgrade-rpm-plugin-imacentos-upgrade-rpm-plugin-ima-debuginfocentos-upgrade-rpm-plugin-prioreset-debuginfocentos-upgrade-rpm-plugin-selinuxcentos-upgrade-rpm-plugin-selinux-debuginfocentos-upgrade-rpm-plugin-syslogcentos-upgrade-rpm-plugin-syslog-debuginfocentos-upgrade-rpm-plugin-systemd-inhibitcentos-upgrade-rpm-plugin-systemd-inhibit-debuginfocentos-upgrade-rpm-signcentos-upgrade-rpm-sign-debuginfocentos-upgrade-rpm-sign-libscentos-upgrade-rpm-sign-libs-debuginfo
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.