发布时间: 2022年9月8日
修改时间: 2024年10月31日
A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
NVD | openEuler | |
---|---|---|
Confidentiality | High | High |
Attack Vector | Local | Local |
CVSS评分 | 6.7 | 7.8 |
Attack Complexity | Low | Low |
Privileges Required | High | Low |
Scope | Unchanged | Unchanged |
Integrity | High | High |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-2019 | rpm security update | 2022年9月8日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | rpm | Fixed |
KY3.4-5A | rpm | Fixed |
KY3.5.1 | rpm | Fixed |