lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2010-06-08T18:00:00
Updated: 2024-08-07T02:17:14.557Z
Reserved: 2010-05-25T00:00:00
Link: CVE-2010-2059
Vulnrichment
No data.
NVD
Status : Modified
Published: 2010-06-08T18:30:10.037
Modified: 2024-11-21T01:15:48.970
Link: CVE-2010-2059
Redhat