vulnerability

Red Hat: CVE-2021-3421: CVE-2021-3421 rpm: unsigned signature header leads to string injection into an rpm database (Multiple Advisories)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
May 19, 2021
Added
Sep 10, 2021
Modified
Aug 11, 2025

Description

A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.

Solutions

no-fix-redhat-rpm-packageredhat-upgrade-python3-rpmredhat-upgrade-python3-rpm-debuginforedhat-upgrade-rpmredhat-upgrade-rpm-apidocsredhat-upgrade-rpm-buildredhat-upgrade-rpm-build-debuginforedhat-upgrade-rpm-build-libsredhat-upgrade-rpm-build-libs-debuginforedhat-upgrade-rpm-cronredhat-upgrade-rpm-debuginforedhat-upgrade-rpm-debugsourceredhat-upgrade-rpm-develredhat-upgrade-rpm-devel-debuginforedhat-upgrade-rpm-libsredhat-upgrade-rpm-libs-debuginforedhat-upgrade-rpm-plugin-fapolicydredhat-upgrade-rpm-plugin-fapolicyd-debuginforedhat-upgrade-rpm-plugin-imaredhat-upgrade-rpm-plugin-ima-debuginforedhat-upgrade-rpm-plugin-prioresetredhat-upgrade-rpm-plugin-prioreset-debuginforedhat-upgrade-rpm-plugin-selinuxredhat-upgrade-rpm-plugin-selinux-debuginforedhat-upgrade-rpm-plugin-syslogredhat-upgrade-rpm-plugin-syslog-debuginforedhat-upgrade-rpm-plugin-systemd-inhibitredhat-upgrade-rpm-plugin-systemd-inhibit-debuginforedhat-upgrade-rpm-signredhat-upgrade-rpm-sign-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.