CVE-2021-20271

NameCVE-2021-20271
DescriptionA flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs985308

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rpm (PTS)jessie4.11.3-1.1vulnerable
stretch4.12.0.2+dfsg1-2vulnerable
buster4.14.2.1+dfsg1-1vulnerable
bullseye4.16.1.2+dfsg1-3fixed
bookworm4.18.0+dfsg-1+deb12u1fixed
sid, trixie4.20.0+dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rpmsource(unstable)4.16.1.2+dfsg1-1985308

Notes

[buster] - rpm <no-dsa> (Minor issue)
[stretch] - rpm <no-dsa> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=1934125
[jessie] - rpm <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems