Vulnerabilities > RPM > Medium

DATE CVE VULNERABILITY TITLE RISK
2022-08-26 CVE-2021-35939 Link Following vulnerability in multiple products
It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created.
local
low complexity
rpm redhat CWE-59
6.7
2022-08-25 CVE-2021-35937 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in multiple products
A race condition vulnerability was found in rpm.
local
high complexity
rpm redhat fedoraproject CWE-367
6.4
2022-08-25 CVE-2021-35938 Link Following vulnerability in multiple products
A symbolic link issue was found in rpm.
local
low complexity
rpm fedoraproject redhat CWE-59
6.7
2022-08-22 CVE-2021-3521 Improper Verification of Cryptographic Signature vulnerability in RPM
There is a flaw in RPM's signature functionality.
local
high complexity
rpm CWE-347
4.7
2021-05-19 CVE-2021-3421 Improper Verification of Cryptographic Signature vulnerability in multiple products
A flaw was found in the RPM package in the read functionality.
local
low complexity
rpm redhat fedoraproject CWE-347
5.5
2021-04-30 CVE-2021-20266 Out-of-bounds Read vulnerability in multiple products
A flaw was found in RPM's hdrblobInit() in lib/header.c.
network
low complexity
rpm fedoraproject CWE-125
4.9
2019-03-27 CVE-2019-3817 Use After Free vulnerability in RPM Libcomps
A use-after-free flaw has been discovered in libcomps before version 0.1.10 in the way ObjMRTrees are merged.
network
rpm CWE-416
6.8
2010-06-08 CVE-2010-2197 Permissions, Privileges, and Access Controls vulnerability in RPM
rpmbuild in RPM 4.8.0 and earlier does not properly parse the syntax of spec files, which allows user-assisted remote attackers to remove home directories via vectors involving a ;~ (semicolon tilde) sequence in a Name tag.
network
rpm CWE-264
5.8
2006-11-06 CVE-2006-5466 Heap-based buffer overflow in the showQueryPackage function in librpm in RPM Package Manager 4.4.8, when the LANG environment variable is set to ru_RU.UTF-8, might allow user-assisted attackers to execute arbitrary code via crafted RPM packages.
network
high complexity
rpm ubuntu
5.4