Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-35939
HistoryAug 26, 2022 - 12:00 a.m.

CVE-2021-35939

2022-08-2600:00:00
ubuntu.com
ubuntu.com
14

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

MULTIPLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:M/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

31.1%

It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was
incomplete: the check was only implemented for the parent directory of the
file to be created. A local unprivileged user who owns another ancestor
directory could potentially use this flaw to gain root privileges. The
highest threat from this vulnerability is to data confidentiality and
integrity as well as system availability.

Notes

Author Note
seth-arnold Only debugedit and librpmio9 binary packages are in main, and triaged with view to how they are used in the build process as described in https://bugs.launchpad.net/ubuntu/+source/rpm/+bug/1913871

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

MULTIPLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:M/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

31.1%