lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T02:17:14.557Z
Reserved: 2010-05-25T00:00:00
Link: CVE-2010-2059

No data.

Status : Modified
Published: 2010-06-08T18:30:10.037
Modified: 2024-11-21T01:15:48.970
Link: CVE-2010-2059
