Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.2.2023.1202
Category:Huawei EulerOS Local Security Checks
Title:Huawei EulerOS: Security Advisory for rpm (EulerOS-SA-2023-1202)
Summary:The remote host is missing an update for the Huawei EulerOS 'rpm' package(s) announced via the EulerOS-SA-2023-1202 advisory.
Description:Summary:
The remote host is missing an update for the Huawei EulerOS 'rpm' package(s) announced via the EulerOS-SA-2023-1202 advisory.

Vulnerability Insight:
It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-35939)

A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-35937)

A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-35938)

Affected Software/OS:
'rpm' package(s) on Huawei EulerOS Virtualization release 2.9.1.

Solution:
Please install the updated package(s).

CVSS Score:
6.5

CVSS Vector:
AV:L/AC:L/Au:M/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-35937
GLSA-202210-22
https://security.gentoo.org/glsa/202210-22
https://access.redhat.com/security/cve/CVE-2021-35937
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://rpm.org/wiki/Releases/4.18.0
https://www.usenix.org/legacy/event/sec05/tech/full_papers/borisov/borisov.pdf
Common Vulnerability Exposure (CVE) ID: CVE-2021-35938
https://access.redhat.com/security/cve/CVE-2021-35938
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.suse.com/show_bug.cgi?id=1157880
https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033
https://github.com/rpm-software-management/rpm/pull/1919
Common Vulnerability Exposure (CVE) ID: CVE-2021-35939
https://access.redhat.com/security/cve/CVE-2021-35939
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.