CVE-2010-2059

Source
https://nvd.nist.gov/vuln/detail/CVE-2010-2059
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2010-2059.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2010-2059
Published
2010-06-08T18:30:10Z
Modified
2025-04-11T00:51:21Z
Downstream
Summary
[none]
Details

lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.

References

Affected packages

Debian:11 / rpm

Package

Name
rpm
Purl
pkg:deb/debian/rpm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.8.1-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / rpm

Package

Name
rpm
Purl
pkg:deb/debian/rpm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.8.1-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / rpm

Package

Name
rpm
Purl
pkg:deb/debian/rpm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.8.1-1

Ecosystem specific

{
    "urgency": "unimportant"
}