A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[
    {
        "source": "https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033",
        "signature_version": "v1",
        "deprecated": false,
        "id": "CVE-2021-35938-6ff8734b",
        "target": {
            "file": "lib/fsm.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "280623155716057075973965713759273863140",
                "67026450021903754845164842287235129457",
                "158411457487267255824690252833708700168"
            ]
        },
        "signature_type": "Line"
    },
    {
        "source": "https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033",
        "signature_version": "v1",
        "deprecated": false,
        "id": "CVE-2021-35938-c3afe85b",
        "target": {
            "function": "rpmPackageFilesInstall",
            "file": "lib/fsm.c"
        },
        "digest": {
            "length": 5307.0,
            "function_hash": "106619841970814527190268285391749306210"
        },
        "signature_type": "Function"
    }
]