CVE Vulnerabilities

CVE-2021-35937

Improper Link Resolution Before File Access ('Link Following')

Published: Aug 25, 2022 | Modified: Nov 21, 2024
CVSS 3.x
6.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
6.3 MODERATE
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

NameVendorStart VersionEnd Version
RpmRpm*4.18.0 (excluding)
Red Hat Enterprise Linux 8RedHatrpm-0:4.14.3-28.el8_9*
Red Hat Enterprise Linux 8RedHatrpm-0:4.14.3-28.el8_9*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatrpm-0:4.14.3-26.el8_6*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatrpm-0:4.14.3-28.el8_8*
Red Hat Enterprise Linux 9RedHatrpm-0:4.16.1.3-27.el9_3*
Red Hat Enterprise Linux 9RedHatrpm-0:4.16.1.3-27.el9_3*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatrpm-0:4.16.1.3-14.el9_0.1*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatrpm-0:4.16.1.3-24.el9_2*
Red Hat OpenShift Container Platform 4.13RedHatopenshift4-wincw/windows-machine-config-operator-bundle:v8.1.2-13*
Red Hat OpenShift Container Platform 4.13RedHatopenshift4-wincw/windows-machine-config-rhel9-operator:8.1.2-13*
RHODF-4.15-RHEL-9RedHatodf4/cephcsi-rhel9:v4.15.0-37*
RHODF-4.15-RHEL-9RedHatodf4/mcg-core-rhel9:v4.15.0-68*
RHODF-4.15-RHEL-9RedHatodf4/mcg-operator-bundle:v4.15.0-158*
RHODF-4.15-RHEL-9RedHatodf4/mcg-rhel9-operator:v4.15.0-39*
RHODF-4.15-RHEL-9RedHatodf4/ocs-client-console-rhel9:v4.15.0-58*
RHODF-4.15-RHEL-9RedHatodf4/ocs-client-operator-bundle:v4.15.0-158*
RHODF-4.15-RHEL-9RedHatodf4/ocs-client-rhel9-operator:v4.15.0-13*
RHODF-4.15-RHEL-9RedHatodf4/ocs-metrics-exporter-rhel9:v4.15.0-81*
RHODF-4.15-RHEL-9RedHatodf4/ocs-operator-bundle:v4.15.0-158*
RHODF-4.15-RHEL-9RedHatodf4/ocs-rhel9-operator:v4.15.0-79*
RHODF-4.15-RHEL-9RedHatodf4/odf-cli-rhel9:v4.15.0-22*
RHODF-4.15-RHEL-9RedHatodf4/odf-console-rhel9:v4.15.0-57*
RHODF-4.15-RHEL-9RedHatodf4/odf-cosi-sidecar-rhel9:v4.15.0-6*
RHODF-4.15-RHEL-9RedHatodf4/odf-csi-addons-operator-bundle:v4.15.0-158*
RHODF-4.15-RHEL-9RedHatodf4/odf-csi-addons-rhel9-operator:v4.15.0-15*
RHODF-4.15-RHEL-9RedHatodf4/odf-csi-addons-sidecar-rhel9:v4.15.0-15*
RHODF-4.15-RHEL-9RedHatodf4/odf-multicluster-console-rhel9:v4.15.0-54*
RHODF-4.15-RHEL-9RedHatodf4/odf-multicluster-operator-bundle:v4.15.0-158*
RHODF-4.15-RHEL-9RedHatodf4/odf-multicluster-rhel9-operator:v4.15.0-10*
RHODF-4.15-RHEL-9RedHatodf4/odf-must-gather-rhel9:v4.15.0-26*
RHODF-4.15-RHEL-9RedHatodf4/odf-operator-bundle:v4.15.0-158*
RHODF-4.15-RHEL-9RedHatodf4/odf-rhel9-operator:v4.15.0-19*
RHODF-4.15-RHEL-9RedHatodf4/odr-cluster-operator-bundle:v4.15.0-158*
RHODF-4.15-RHEL-9RedHatodf4/odr-hub-operator-bundle:v4.15.0-158*
RHODF-4.15-RHEL-9RedHatodf4/odr-rhel9-operator:v4.15.0-21*
RHODF-4.15-RHEL-9RedHatodf4/rook-ceph-rhel9-operator:v4.15.0-103*
RpmUbuntubionic*
RpmUbuntufocal*
RpmUbuntugroovy*
RpmUbuntuhirsute*
RpmUbuntuimpish*
RpmUbuntukinetic*
RpmUbuntutrusty*
RpmUbuntutrusty/esm*
RpmUbuntuupstream*
RpmUbuntuxenial*

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References