Bug 625756 (CVE-2005-4889)

Summary: CVE-2005-4889 rpm: fails to drop SUID/SGID bits on package removal
Product: [Other] Security Response Reporter: Tomas Hoger <thoger>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ffesti, omoris
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-19 09:13:14 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 125517, 626709, 626710    
Bug Blocks:    

Description Tomas Hoger 2010-08-20 11:23:23 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2005-4889 to the following vulnerability:

lib/fsm.c in RPM before 4.4.3 does not properly reset the metadata of an executable file during deletion of the file in an RPM package removal, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file, a related issue to CVE-2010-2059. 

References:
https://bugzilla.redhat.com/show_bug.cgi?id=125517
https://bugzilla.redhat.com/show_bug.cgi?id=598775
http://xforce.iss.net/xforce/xfdb/59426

This issue was fixed in Fedora rpm some time ago via bug #125517.  RPM versions in Red Hat Enterprise Linux 3 and 4 do not contain the fix and are affected.

Comment 3 errata-xmlrpc 2010-09-07 14:35:25 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2010:0678 https://rhn.redhat.com/errata/RHSA-2010-0678.html