First published: Tue Feb 23 2021(Updated: )
A flaw was found in libdnf's signature verification functionality in versions before 0.60.1. This flaw allows an attacker to achieve code execution if they can alter the header information of an RPM package and then trick a user or system into installing it. The highest risk of this vulnerability is to confidentiality, integrity, as well as system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 | |
redhat/libdnf | <0.60.1 | 0.60.1 |
Rpm Libdnf | <0.60.1 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Redhat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3445 is a vulnerability in libdnf that could allow a remote authenticated attacker to execute arbitrary code on the system.
The severity of CVE-2021-3445 is medium, with a severity value of 6.4.
An attacker can exploit CVE-2021-3445 by placing a signature in the main header, which allows them to execute arbitrary code on the system.
To fix CVE-2021-3445 for IBM QRadar SIEM 7.5.0 GA, apply the patch provided by IBM. You can download the patch from the IBM Support website.
To fix CVE-2021-3445 for IBM QRadar SIEM 7.4.3 GA - 7.4.3 FP4, apply the patch provided by IBM. You can download the patch from the IBM Support website.
To fix CVE-2021-3445 for IBM QRadar SIEM 7.3.3 GA - 7.3.3 FP10, apply the patch provided by IBM. You can download the patch from the IBM Support website.