First published: Tue Mar 02 2021(Updated: )
RPM could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the signature check function. By persuading a victim to open a specially-crafted package file, an attacker could exploit this vulnerability to cause RPM database corruption and execute arbitrary code on the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
Rpm Rpm | >=4.15.0<4.15.1.3 | |
Rpm Rpm | >=4.16.0<4.16.1.3 | |
Rpm Rpm | =4.15.0-alpha | |
Rpm Rpm | =4.15.0-beta1 | |
Rpm Rpm | =4.15.0-rc1 | |
Rpm Rpm | =4.16.0-alpha | |
Rpm Rpm | =4.16.0-beta2 | |
Rpm Rpm | =4.16.0-beta3 | |
Rpm Rpm | =4.16.0-rc1 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Starwindsoftware Starwind Virtual San | =v8-build14398 |
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20271 is a vulnerability in RPM that could allow a remote attacker to execute arbitrary code on the system.
CVE-2021-20271 has a severity rating of high with a CVSS score of 7.
Cloud Pak for Security (CP4S) versions 1.7.2.0, 1.7.1.0, and 1.7.0.0 are affected by CVE-2021-20271. Additionally, RPM versions 4.15.0 to 4.15.1.3 and 4.16.0 to 4.16.1.3 are also affected.
An attacker can exploit CVE-2021-20271 by convincing a victim to install a seemingly verifiable package with a modified signature header, which can lead to RPM database corruption and code execution.
To fix CVE-2021-20271, it is recommended to update to a patched version of RPM or apply the relevant security patch provided by the vendor.