CVE-2021-20271

A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1934125 Issue Tracking Patch Third Party Advisory
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 Patch Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://security.gentoo.org/glsa/202107-43 Third Party Advisory
https://www.starwindsoftware.com/security/sw-20220805-0002/ Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1934125 Issue Tracking Patch Third Party Advisory
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 Patch Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://security.gentoo.org/glsa/202107-43 Third Party Advisory
https://www.starwindsoftware.com/security/sw-20220805-0002/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.15.0:alpha:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.15.0:beta1:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.15.0:rc1:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.16.0:alpha:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.16.0:beta2:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.16.0:beta3:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.16.0:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14398:*:*:*:*:*:*

History

21 Nov 2024, 05:46

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1934125 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1934125 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 - Patch, Third Party Advisory () https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 - Patch, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/ -
References () https://security.gentoo.org/glsa/202107-43 - Third Party Advisory () https://security.gentoo.org/glsa/202107-43 - Third Party Advisory
References () https://www.starwindsoftware.com/security/sw-20220805-0002/ - Third Party Advisory () https://www.starwindsoftware.com/security/sw-20220805-0002/ - Third Party Advisory

Information

Published : 2021-03-26 17:15

Updated : 2024-11-21 05:46


NVD link : CVE-2021-20271

Mitre link : CVE-2021-20271

CVE.ORG link : CVE-2021-20271


JSON object : View

Products Affected

starwindsoftware

  • starwind_virtual_san

redhat

  • enterprise_linux

rpm

  • rpm

fedoraproject

  • fedora
CWE
CWE-345

Insufficient Verification of Data Authenticity