Rapid7 Vulnerability & Exploit Database

Rocky Linux: CVE-2021-3521: Moderate: rpm security update (RLSA-2022-368)

Back to Search

Rocky Linux: CVE-2021-3521: Moderate: rpm security update (RLSA-2022-368)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
02/02/2022
Created
05/06/2022
Added
05/05/2022
Modified
05/06/2022

Description

There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature."[1] RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity. 1. https://tools.ietf.org/html/rfc4880#section-5.2.1

Solution(s)

  • rocky-upgrade-python3-rpm
  • rocky-upgrade-python3-rpm-debuginfo
  • rocky-upgrade-rpm
  • rocky-upgrade-rpm-apidocs
  • rocky-upgrade-rpm-build
  • rocky-upgrade-rpm-build-debuginfo
  • rocky-upgrade-rpm-build-libs
  • rocky-upgrade-rpm-build-libs-debuginfo
  • rocky-upgrade-rpm-cron
  • rocky-upgrade-rpm-debuginfo
  • rocky-upgrade-rpm-debugsource
  • rocky-upgrade-rpm-devel
  • rocky-upgrade-rpm-devel-debuginfo
  • rocky-upgrade-rpm-libs
  • rocky-upgrade-rpm-libs-debuginfo
  • rocky-upgrade-rpm-plugin-fapolicyd
  • rocky-upgrade-rpm-plugin-fapolicyd-debuginfo
  • rocky-upgrade-rpm-plugin-ima
  • rocky-upgrade-rpm-plugin-ima-debuginfo
  • rocky-upgrade-rpm-plugin-prioreset
  • rocky-upgrade-rpm-plugin-prioreset-debuginfo
  • rocky-upgrade-rpm-plugin-selinux
  • rocky-upgrade-rpm-plugin-selinux-debuginfo
  • rocky-upgrade-rpm-plugin-syslog
  • rocky-upgrade-rpm-plugin-syslog-debuginfo
  • rocky-upgrade-rpm-plugin-systemd-inhibit
  • rocky-upgrade-rpm-plugin-systemd-inhibit-debuginfo
  • rocky-upgrade-rpm-sign
  • rocky-upgrade-rpm-sign-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;