CVE Vulnerabilities

CVE-2021-3421

Improper Verification of Cryptographic Signature

Published: May 19, 2021 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
4.7 MODERATE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

NameVendorStart VersionEnd Version
RpmRpm*4.16.1.3 (excluding)
Red Hat Enterprise Linux 8RedHatrpm-0:4.14.3-14.el8_4*
Red Hat Enterprise Linux 8RedHatrpm-0:4.14.3-14.el8_4*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatrpm-0:4.14.2-38.el8_2*
RpmUbuntubionic*
RpmUbuntuesm-apps/bionic*
RpmUbuntuesm-apps/focal*
RpmUbuntuesm-apps/xenial*
RpmUbuntuesm-infra-legacy/trusty*
RpmUbuntufocal*
RpmUbuntugroovy*
RpmUbuntuhirsute*
RpmUbuntuimpish*
RpmUbuntuprecise/esm*
RpmUbuntutrusty*
RpmUbuntutrusty/esm*
RpmUbuntuupstream*
RpmUbuntuxenial*

References