Description
It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References (6)
Core 6
Core References
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202210-22
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2021-35939
Exploit, Issue Tracking, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
Patch, Third Party Advisory
https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556
Patch, Third Party Advisory
https://github.com/rpm-software-management/rpm/pull/1919
Release Notes, Vendor Advisory
https://rpm.org/wiki/Releases/4.18.0
Scores
CVSS v3
6.7
EPSS
0.0021
EPSS Percentile
42.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-59
Status
published
Products (2)
redhat/enterprise_linux
8.0
rpm/rpm
< 4.18
Published
Aug 26, 2022
Tracked Since
Feb 18, 2026