First published: Tue Jun 01 2010(Updated: )
lib/fsm.c in RPM before 4.4.3 does not properly reset the metadata of an executable file during deletion of the file in an RPM package removal, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file, a related issue to CVE-2010-2059.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rpm | <0:4.3.3-33_nonptl.el4_8.1 | 0:4.3.3-33_nonptl.el4_8.1 |
RPM Package Manager | =2.3.5 | |
RPM Package Manager | =4.4.2.1 | |
RPM Package Manager | =1.4.3 | |
RPM Package Manager | =3.0.1 | |
RPM Package Manager | =4.1 | |
RPM Package Manager | =2.2.3.11 | |
RPM Package Manager | =2.4.4 | |
RPM Package Manager | =2.3.8 | |
RPM Package Manager | =2.0.6 | |
RPM Package Manager | =1.4.4 | |
RPM Package Manager | =1.4.2\/a | |
RPM Package Manager | =2.4.1 | |
RPM Package Manager | =2.4.9 | |
RPM Package Manager | =2.6.7 | |
RPM Package Manager | =2..4.10 | |
RPM Package Manager | =1.4 | |
RPM Package Manager | =2.0.10 | |
RPM Package Manager | =2.4.5 | |
RPM Package Manager | =4.0.1 | |
RPM Package Manager | =2.2.11 | |
RPM Package Manager | =4.0.4 | |
RPM Package Manager | =2.2.1 | |
RPM Package Manager | =2.0.1 | |
RPM Package Manager | =1.4.2 | |
RPM Package Manager | =3.0.3 | |
RPM Package Manager | =2.0.7 | |
RPM Package Manager | =4.0.2 | |
RPM Package Manager | =2.2.8 | |
RPM Package Manager | =3.0.2 | |
RPM Package Manager | =1.2 | |
RPM Package Manager | =4.0. | |
RPM Package Manager | =2.1.1 | |
RPM Package Manager | =4.3.3 | |
RPM Package Manager | =2.5.5 | |
RPM Package Manager | =2.0.8 | |
RPM Package Manager | =2.3 | |
RPM Package Manager | =4.4.2.2 | |
RPM Package Manager | =2.4.8 | |
RPM Package Manager | =3.0.4 | |
RPM Package Manager | =2.5.6 | |
RPM Package Manager | =2.0 | |
RPM Package Manager | =2.0.2 | |
RPM Package Manager | =2.3.2 | |
RPM Package Manager | =2.4.3 | |
RPM Package Manager | =2.4.2 | |
RPM Package Manager | =1.4.5 | |
RPM Package Manager | =2.0.11 | |
RPM Package Manager | =3.0.5 | |
RPM Package Manager | =1.3 | |
RPM Package Manager | =2.2.3 | |
RPM Package Manager | =2.2 | |
RPM Package Manager | =2.1.2 | |
RPM Package Manager | =2.3.9 | |
RPM Package Manager | =2.2.4 | |
RPM Package Manager | =2.2.9 | |
RPM Package Manager | =2.5.3 | |
RPM Package Manager | =2.2.6 | |
RPM Package Manager | =2.3.6 | |
RPM Package Manager | =2.5 | |
RPM Package Manager | =2.2.3.10 | |
RPM Package Manager | =2.0.5 | |
RPM Package Manager | =2.4.12 | |
RPM Package Manager | =2.5.4 | |
RPM Package Manager | =1.4.7 | |
RPM Package Manager | =3.0 | |
RPM Package Manager | =1.4.6 | |
RPM Package Manager | =2.5.2 | |
RPM Package Manager | =2.4.11 | |
RPM Package Manager | =2.0.9 | |
RPM Package Manager | =2.1 | |
RPM Package Manager | =2.2.10 | |
RPM Package Manager | =2.3.3 | |
RPM Package Manager | =2.3.7 | |
RPM Package Manager | =2.3.4 | |
RPM Package Manager | <=4.4.2.3 | |
RPM Package Manager | =2.0.4 | |
RPM Package Manager | =1.3.1 | |
RPM Package Manager | =3.0.6 | |
RPM Package Manager | =2.0.3 | |
RPM Package Manager | =4.4.2. | |
RPM Package Manager | =2.3.1 | |
RPM Package Manager | =4.0.3 | |
RPM Package Manager | =2.4.6 | |
RPM Package Manager | =2.5.1 | |
RPM Package Manager | =2.2.5 | |
RPM Package Manager | =2.2.2 | |
RPM Package Manager | =2.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4889 has a high severity level due to its potential for privilege escalation.
To mitigate CVE-2005-4889, upgrade RPM to version 4.4.3 or later.
CVE-2005-4889 affects RPM versions earlier than 4.4.3, including versions 4.4.2.2 and prior.
Yes, CVE-2005-4889 allows local users to exploit the vulnerability to gain elevated privileges.
CVE-2005-4889 impacts systems using vulnerable RPM versions, particularly on Red Hat Enterprise Linux.