Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2021-3521
Modified
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-22 Aug, 2022 | 15:15
Updated At-12 Feb, 2023 | 23:41

There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature." RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity. To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM or public key. It is strongly recommended to only use RPMs and public keys from trusted sources.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.7MEDIUM
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
Type: Primary
Version: 3.1
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
CPE Matches

rpm
rpm
>>rpm>>Versions before 4.17.1(exclusive)
cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-347Primarysecalert@redhat.com
CWE-347Secondarynvd@nist.gov
CWE ID: CWE-347
Type: Primary
Source: secalert@redhat.com
CWE ID: CWE-347
Type: Secondary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/security/cve/CVE-2021-3521secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1941098secalert@redhat.com
Issue Tracking
Patch
Third Party Advisory
https://github.com/rpm-software-management/rpm/commit/bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8secalert@redhat.com
Patch
Third Party Advisory
https://github.com/rpm-software-management/rpm/pull/1795/secalert@redhat.com
Patch
Third Party Advisory
https://security.gentoo.org/glsa/202210-22secalert@redhat.com
Third Party Advisory
Hyperlink: https://access.redhat.com/security/cve/CVE-2021-3521
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1941098
Source: secalert@redhat.com
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: https://github.com/rpm-software-management/rpm/commit/bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8
Source: secalert@redhat.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/rpm-software-management/rpm/pull/1795/
Source: secalert@redhat.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/202210-22
Source: secalert@redhat.com
Resource:
Third Party Advisory
Change History
0Changes found

Details not found