A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[
{
"source": "https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2021-35938-6ff8734b",
"target": {
"file": "lib/fsm.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"280623155716057075973965713759273863140",
"67026450021903754845164842287235129457",
"158411457487267255824690252833708700168"
]
},
"signature_type": "Line"
},
{
"source": "https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2021-35938-c3afe85b",
"target": {
"function": "rpmPackageFilesInstall",
"file": "lib/fsm.c"
},
"digest": {
"length": 5307.0,
"function_hash": "106619841970814527190268285391749306210"
},
"signature_type": "Function"
}
]