CVE-2021-20271

A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1934125 Issue Tracking Patch Third Party Advisory
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 Patch Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://security.gentoo.org/glsa/202107-43 Third Party Advisory
https://www.starwindsoftware.com/security/sw-20220805-0002/ Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1934125 Issue Tracking Patch Third Party Advisory
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 Patch Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://security.gentoo.org/glsa/202107-43 Third Party Advisory
https://www.starwindsoftware.com/security/sw-20220805-0002/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.15.0:alpha:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.15.0:beta1:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.15.0:rc1:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.16.0:alpha:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.16.0:beta2:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.16.0:beta3:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.16.0:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14398:*:*:*:*:*:*

History

No history.

Information

Published : 2021-03-26 17:15

Updated : 2024-11-21 05:46


NVD link : CVE-2021-20271

Mitre link : CVE-2021-20271

CVE.ORG link : CVE-2021-20271


JSON object : View

Products Affected

redhat

  • enterprise_linux

rpm

  • rpm

fedoraproject

  • fedora

starwindsoftware

  • starwind_virtual_san
CWE
CWE-345

Insufficient Verification of Data Authenticity