First published: Fri Oct 07 2011(Updated: )
The headerVerifyInfo function in lib/header.c in RPM before 4.9.1.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a negative value in a region offset of a package header, which is not properly handled in a numeric range comparison.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rpm Rpm | <=4.9.1.2 | |
Rpm Rpm | =1.2 | |
Rpm Rpm | =1.3 | |
Rpm Rpm | =1.3.1 | |
Rpm Rpm | =1.4 | |
Rpm Rpm | =1.4.1 | |
Rpm Rpm | =1.4.2 | |
Rpm Rpm | =1.4.2\/a | |
Rpm Rpm | =1.4.3 | |
Rpm Rpm | =1.4.4 | |
Rpm Rpm | =1.4.5 | |
Rpm Rpm | =1.4.6 | |
Rpm Rpm | =1.4.7 | |
Rpm Rpm | =2.0 | |
Rpm Rpm | =2.0.1 | |
Rpm Rpm | =2.0.2 | |
Rpm Rpm | =2.0.3 | |
Rpm Rpm | =2.0.4 | |
Rpm Rpm | =2.0.5 | |
Rpm Rpm | =2.0.6 | |
Rpm Rpm | =2.0.7 | |
Rpm Rpm | =2.0.8 | |
Rpm Rpm | =2.0.9 | |
Rpm Rpm | =2.0.10 | |
Rpm Rpm | =2.0.11 | |
Rpm Rpm | =2.1 | |
Rpm Rpm | =2.1.1 | |
Rpm Rpm | =2.1.2 | |
Rpm Rpm | =2.2 | |
Rpm Rpm | =2.2.1 | |
Rpm Rpm | =2.2.2 | |
Rpm Rpm | =2.2.3 | |
Rpm Rpm | =2.2.3.10 | |
Rpm Rpm | =2.2.3.11 | |
Rpm Rpm | =2.2.4 | |
Rpm Rpm | =2.2.5 | |
Rpm Rpm | =2.2.6 | |
Rpm Rpm | =2.2.7 | |
Rpm Rpm | =2.2.8 | |
Rpm Rpm | =2.2.9 | |
Rpm Rpm | =2.2.10 | |
Rpm Rpm | =2.2.11 | |
Rpm Rpm | =2.3 | |
Rpm Rpm | =2.3.1 | |
Rpm Rpm | =2.3.2 | |
Rpm Rpm | =2.3.3 | |
Rpm Rpm | =2.3.4 | |
Rpm Rpm | =2.3.5 | |
Rpm Rpm | =2.3.6 | |
Rpm Rpm | =2.3.7 | |
Rpm Rpm | =2.3.8 | |
Rpm Rpm | =2.3.9 | |
Rpm Rpm | =2.4.1 | |
Rpm Rpm | =2.4.2 | |
Rpm Rpm | =2.4.3 | |
Rpm Rpm | =2.4.4 | |
Rpm Rpm | =2.4.5 | |
Rpm Rpm | =2.4.6 | |
Rpm Rpm | =2.4.8 | |
Rpm Rpm | =2.4.9 | |
Rpm Rpm | =2.4.11 | |
Rpm Rpm | =2.4.12 | |
Rpm Rpm | =2.5 | |
Rpm Rpm | =2.5.1 | |
Rpm Rpm | =2.5.2 | |
Rpm Rpm | =2.5.3 | |
Rpm Rpm | =2.5.4 | |
Rpm Rpm | =2.5.5 | |
Rpm Rpm | =2.5.6 | |
Rpm Rpm | =2.6.7 | |
Rpm Rpm | =3.0 | |
Rpm Rpm | =3.0.1 | |
Rpm Rpm | =3.0.2 | |
Rpm Rpm | =3.0.3 | |
Rpm Rpm | =3.0.4 | |
Rpm Rpm | =3.0.5 | |
Rpm Rpm | =3.0.6 | |
Rpm Rpm | =4.0. | |
Rpm Rpm | =4.0.1 | |
Rpm Rpm | =4.0.2 | |
Rpm Rpm | =4.0.3 | |
Rpm Rpm | =4.0.4 | |
Rpm Rpm | =4.1 | |
Rpm Rpm | =4.3.3 | |
Rpm Rpm | =4.4.2.1 | |
Rpm Rpm | =4.4.2.2 | |
Rpm Rpm | =4.4.2.3 | |
Rpm Rpm | =4.5.90 | |
Rpm Rpm | =4.6.0 | |
Rpm Rpm | =4.6.0-rc1 | |
Rpm Rpm | =4.6.0-rc2 | |
Rpm Rpm | =4.6.0-rc3 | |
Rpm Rpm | =4.6.0-rc4 | |
Rpm Rpm | =4.6.1 | |
Rpm Rpm | =4.7.0 | |
Rpm Rpm | =4.7.1 | |
Rpm Rpm | =4.7.2 | |
Rpm Rpm | =4.8.0 | |
Rpm Rpm | =4.8.1 | |
Rpm Rpm | =4.9.0 | |
Rpm Rpm | =4.9.0-alpha | |
Rpm Rpm | =4.9.0-beta1 | |
Rpm Rpm | =4.9.0-rc1 | |
Rpm Rpm | =4.9.1 | |
Rpm Rpm | =4.9.1.1 | |
redhat/rpm | <4.9.1.3 | 4.9.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.