vulnerability

Red Hat: CVE-2021-35938: rpm: races with chown/chmod/capabilities calls during installation (Multiple Advisories)

Severity
6
CVSS
(AV:L/AC:M/Au:M/C:C/I:C/A:C)
Published
Aug 25, 2022
Added
Jan 26, 2024
Modified
Sep 1, 2025

Description

A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Solutions

no-fix-redhat-rpm-packageredhat-upgrade-python3-rpmredhat-upgrade-python3-rpm-debuginforedhat-upgrade-rpmredhat-upgrade-rpm-apidocsredhat-upgrade-rpm-buildredhat-upgrade-rpm-build-debuginforedhat-upgrade-rpm-build-libsredhat-upgrade-rpm-build-libs-debuginforedhat-upgrade-rpm-cronredhat-upgrade-rpm-debuginforedhat-upgrade-rpm-debugsourceredhat-upgrade-rpm-develredhat-upgrade-rpm-devel-debuginforedhat-upgrade-rpm-libsredhat-upgrade-rpm-libs-debuginforedhat-upgrade-rpm-plugin-auditredhat-upgrade-rpm-plugin-audit-debuginforedhat-upgrade-rpm-plugin-fapolicydredhat-upgrade-rpm-plugin-fapolicyd-debuginforedhat-upgrade-rpm-plugin-imaredhat-upgrade-rpm-plugin-ima-debuginforedhat-upgrade-rpm-plugin-prioresetredhat-upgrade-rpm-plugin-prioreset-debuginforedhat-upgrade-rpm-plugin-selinuxredhat-upgrade-rpm-plugin-selinux-debuginforedhat-upgrade-rpm-plugin-syslogredhat-upgrade-rpm-plugin-syslog-debuginforedhat-upgrade-rpm-plugin-systemd-inhibitredhat-upgrade-rpm-plugin-systemd-inhibit-debuginforedhat-upgrade-rpm-signredhat-upgrade-rpm-sign-debuginforedhat-upgrade-rpm-sign-libsredhat-upgrade-rpm-sign-libs-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.