Thursday, January 27, 2022

Red Hat: CVE-2021-3521: Moderate: rpm security update (RHSA-2022:0254)

Description
There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature."[1] RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity.1. https://tools.ietf.org/html/rfc4880#section-5.2.1
Solution(s)
  • redhat-upgrade-python3-rpm
  • redhat-upgrade-python3-rpm-debuginfo
  • redhat-upgrade-rpm
  • redhat-upgrade-rpm-apidocs
  • redhat-upgrade-rpm-build
  • redhat-upgrade-rpm-build-debuginfo
  • redhat-upgrade-rpm-build-libs
  • redhat-upgrade-rpm-build-libs-debuginfo
  • redhat-upgrade-rpm-cron
  • redhat-upgrade-rpm-debuginfo
  • redhat-upgrade-rpm-debugsource
  • redhat-upgrade-rpm-devel
  • redhat-upgrade-rpm-devel-debuginfo
  • redhat-upgrade-rpm-libs
  • redhat-upgrade-rpm-libs-debuginfo
  • redhat-upgrade-rpm-plugin-fapolicyd
  • redhat-upgrade-rpm-plugin-fapolicyd-debuginfo
  • redhat-upgrade-rpm-plugin-ima
  • redhat-upgrade-rpm-plugin-ima-debuginfo
  • redhat-upgrade-rpm-plugin-prioreset
  • redhat-upgrade-rpm-plugin-prioreset-debuginfo
  • redhat-upgrade-rpm-plugin-selinux
  • redhat-upgrade-rpm-plugin-selinux-debuginfo
  • redhat-upgrade-rpm-plugin-syslog
  • redhat-upgrade-rpm-plugin-syslog-debuginfo
  • redhat-upgrade-rpm-plugin-systemd-inhibit
  • redhat-upgrade-rpm-plugin-systemd-inhibit-debuginfo
  • redhat-upgrade-rpm-sign
  • redhat-upgrade-rpm-sign-debuginfo


  • References
  • CVE-2021-3521
  • RHSA-2022:0254




  •  

    Copyright © 2021 Vulnerability Database | Cyber Details™

    thank you Templateism for the design - You should have written the code a little more complicated - Nothing Encrypted anymore