Описание
A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
Отчет
To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM. It is strongly recommended to only use RPMs from trusted repositories.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 6 | rpm | Out of support scope | ||
| Red Hat Enterprise Linux 9 | rpm | Not affected | ||
| Red Hat Enterprise Linux 7 | rpm | Fixed | RHSA-2021:4785 | 23.11.2021 |
| Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118) | rpm | Fixed | RHSA-2021:4771 | 23.11.2021 |
| Red Hat Enterprise Linux 7.6 Telco Extended Update Support | rpm | Fixed | RHSA-2021:4771 | 23.11.2021 |
| Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions | rpm | Fixed | RHSA-2021:4771 | 23.11.2021 |
| Red Hat Enterprise Linux 7.7 Advanced Update Support | rpm | Fixed | RHSA-2021:4975 | 07.12.2021 |
| Red Hat Enterprise Linux 7.7 Telco Extended Update Support | rpm | Fixed | RHSA-2021:4975 | 07.12.2021 |
| Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions | rpm | Fixed | RHSA-2021:4975 | 07.12.2021 |
| Red Hat Enterprise Linux 8 | rpm | Fixed | RHSA-2021:2574 | 29.06.2021 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.7 Medium
CVSS3
Связанные уязвимости
A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package whose signature header was modified to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity confidentiality and system availability.
A flaw was found in RPM's signature check functionality when reading a ...
A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
EPSS
6.7 Medium
CVSS3