<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2021-35939</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2021-35939</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>25</Number>
        <Date>2023-02-11T00:41:35Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-02-01T02:17:30Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-02-11T00:41:35Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2021-35939</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 12 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 12 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 12 SP4" CPE="cpe:/o:suse:sle-hpc:12:sp4">SUSE Linux Enterprise High Performance Computing 12 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4 LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4 LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp4">SUSE Linux Enterprise Server 11 SP4 LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4" CPE="cpe:/o:suse:sles:12:sp4">SUSE Linux Enterprise Server 12 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="librpmbuild9-4.18.0-1.1">
      <FullProductName ProductID="librpmbuild9-4.18.0-1.1">librpmbuild9-4.18.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rpm">
      <FullProductName ProductID="rpm" CPE="cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*">rpm</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rpm-32bit">
      <FullProductName ProductID="rpm-32bit">rpm-32bit</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rpm-32bit-4.18.0-1.1">
      <FullProductName ProductID="rpm-32bit-4.18.0-1.1">rpm-32bit-4.18.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rpm-4.18.0-1.1">
      <FullProductName ProductID="rpm-4.18.0-1.1" CPE="cpe:2.3:a:rpm:rpm:4.18.0:*:*:*:*:*:*:*">rpm-4.18.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rpm-build">
      <FullProductName ProductID="rpm-build">rpm-build</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rpm-build-4.18.0-1.1">
      <FullProductName ProductID="rpm-build-4.18.0-1.1">rpm-build-4.18.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rpm-build-perl-4.18.0-1.1">
      <FullProductName ProductID="rpm-build-perl-4.18.0-1.1">rpm-build-perl-4.18.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rpm-devel-4.18.0-1.1">
      <FullProductName ProductID="rpm-devel-4.18.0-1.1">rpm-devel-4.18.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="librpmbuild9-4.18.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:librpmbuild9-4.18.0-1.1">librpmbuild9-4.18.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rpm-4.18.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rpm-4.18.0-1.1">rpm-4.18.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rpm-32bit-4.18.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rpm-32bit-4.18.0-1.1">rpm-32bit-4.18.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rpm-build-4.18.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rpm-build-4.18.0-1.1">rpm-build-4.18.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rpm-build-perl-4.18.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rpm-build-perl-4.18.0-1.1">rpm-build-perl-4.18.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rpm-devel-4.18.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rpm-devel-4.18.0-1.1">rpm-devel-4.18.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rpm" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 12 SP4:rpm">rpm as a component of SUSE Linux Enterprise High Performance Computing 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="rpm" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS:rpm">rpm as a component of SUSE Linux Enterprise Server 11 SP4 LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="rpm" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4:rpm">rpm as a component of SUSE Linux Enterprise Server 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="rpm-32bit" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4:rpm-32bit">rpm-32bit as a component of SUSE Linux Enterprise Server 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="rpm-build" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4:rpm-build">rpm-build as a component of SUSE Linux Enterprise Server 12 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2021-35939</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:librpmbuild9-4.18.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rpm-4.18.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rpm-32bit-4.18.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rpm-build-4.18.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rpm-build-perl-4.18.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rpm-devel-4.18.0-1.1</ProductID>
      </Status>
      <Status Type="Known Affected">
        <ProductID>SUSE Linux Enterprise High Performance Computing 12 SP4:rpm</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS:rpm</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:rpm</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:rpm-32bit</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:rpm-build</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>6.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
