CVE-2010-2198
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
08/06/2010
Last modified:
11/04/2025
Description
lib/fsm.c in RPM 4.8.0 and earlier does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade or deletion of the file in an RPM package removal, which might allow local users to gain privileges or bypass intended access restrictions by creating a hard link to a vulnerable file that has (1) POSIX file capabilities or (2) SELinux context information, a related issue to CVE-2010-2059.
Impact
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:rpm:rpm:1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:1.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:1.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:1.4.2\/a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:1.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:1.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:1.4.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:1.4.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:1.4.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:2..4.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rpm:rpm:2.0.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=oss-security&m=127559059928131&w=2
- http://rpm.org/gitweb?p=rpm.git%3Ba%3Dcommit%3Bh%3D4d172a194addc49851e558ea390d3045894e3230
- http://secunia.com/advisories/40028
- http://www.openwall.com/lists/oss-security/2010/06/02/3
- http://www.openwall.com/lists/oss-security/2010/06/03/5
- http://www.openwall.com/lists/oss-security/2010/06/04/1
- http://www.osvdb.org/65144
- https://bugzilla.redhat.com/show_bug.cgi?id=598775
- http://marc.info/?l=oss-security&m=127559059928131&w=2
- http://rpm.org/gitweb?p=rpm.git%3Ba%3Dcommit%3Bh%3D4d172a194addc49851e558ea390d3045894e3230
- http://secunia.com/advisories/40028
- http://www.openwall.com/lists/oss-security/2010/06/02/3
- http://www.openwall.com/lists/oss-security/2010/06/03/5
- http://www.openwall.com/lists/oss-security/2010/06/04/1
- http://www.osvdb.org/65144
- https://bugzilla.redhat.com/show_bug.cgi?id=598775



