Search for packages
Package details: pkg:deb/ubuntu/rpm@4.11.1-3
purl pkg:deb/ubuntu/rpm@4.11.1-3
Next non-vulnerable version 4.14.2.1+dfsg1-1build2
Latest non-vulnerable version 4.14.2.1+dfsg1-1build2
Risk 4.5
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-3598-k5vw-aaac
Aliases:
CVE-2017-7501
It was found that versions of rpm before 4.13.0.2 use temporary files with predictable names when installing an RPM. An attacker with ability to write in a directory where files will be installed could create symbolic links to an arbitrary location and modify content, and possibly permissions to arbitrary files, which could be used for denial of service or possibly privilege escalation.
4.14.2.1+dfsg1-1build2
Affected by 0 other vulnerabilities.
VCID-pcjv-raf8-aaap
Aliases:
CVE-2017-7500
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
4.14.2.1+dfsg1-1build2
Affected by 0 other vulnerabilities.
VCID-v2jk-5cb5-aaah
Aliases:
CVE-2013-6435
Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
4.11.1-3ubuntu0.1
Affected by 2 other vulnerabilities.
VCID-z7q8-uh7q-aaap
Aliases:
CVE-2014-8118
Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.
4.11.1-3ubuntu0.1
Affected by 2 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version