vulnerability

Rocky Linux: CVE-2021-20271: rpm (RLSA-2021-2574)

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Published
Mar 26, 2021
Added
May 5, 2022
Modified
Aug 13, 2025

Description

A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.

Solutions

rocky-upgrade-python3-rpmrocky-upgrade-python3-rpm-debuginforocky-upgrade-rpmrocky-upgrade-rpm-buildrocky-upgrade-rpm-build-debuginforocky-upgrade-rpm-build-libsrocky-upgrade-rpm-build-libs-debuginforocky-upgrade-rpm-debuginforocky-upgrade-rpm-debugsourcerocky-upgrade-rpm-develrocky-upgrade-rpm-devel-debuginforocky-upgrade-rpm-libsrocky-upgrade-rpm-libs-debuginforocky-upgrade-rpm-plugin-fapolicydrocky-upgrade-rpm-plugin-fapolicyd-debuginforocky-upgrade-rpm-plugin-imarocky-upgrade-rpm-plugin-ima-debuginforocky-upgrade-rpm-plugin-prioresetrocky-upgrade-rpm-plugin-prioreset-debuginforocky-upgrade-rpm-plugin-selinuxrocky-upgrade-rpm-plugin-selinux-debuginforocky-upgrade-rpm-plugin-syslogrocky-upgrade-rpm-plugin-syslog-debuginforocky-upgrade-rpm-plugin-systemd-inhibitrocky-upgrade-rpm-plugin-systemd-inhibit-debuginforocky-upgrade-rpm-signrocky-upgrade-rpm-sign-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.