File _patchinfo of Package patchinfo.25783

<patchinfo incident="25783">
  <issue tracker="bnc" id="1183543">VUL-0: CVE-2021-3421: rpm: unsigned signature header leads to string injection into an rpm database</issue>
  <issue tracker="bnc" id="1185299">VUL-0: rpm: There are several issues in RPM</issue>
  <issue tracker="bnc" id="1183659">L3: rpmdb corruption on rpm --import</issue>
  <issue tracker="bnc" id="1183545">VUL-0: CVE-2021-20271: rpm: Signature checks bypass via corrupted rpm package</issue>
  <issue tracker="bnc" id="996280">VUL-0: rpm: multiple vulnerabilities in RPM</issue>
  <issue tracker="bnc" id="1183632">VUL-1: CVE-2021-20266: rpm: missing length checks in hdrblobInit()</issue>
  <issue tracker="cve" id="2021-20266"/>
  <issue tracker="cve" id="2021-20271"/>
  <issue tracker="cve" id="2021-3421"/>
  <packager>mlschroe</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for rpm</summary>
  <description>This update for rpm fixes the following issues:

- Fixed PGP parsing bugs (bsc#1185299).
- Fixed various format handling bugs (bsc#996280).
- CVE-2021-3421: Fixed vulnerability where unsigned headers could be injected into the rpm database (bsc#1183543). 
- CVE-2021-20271: Fixed vulnerability where a corrupted rpm could corrupt the rpm database (bsc#1183545).
- CVE-2021-20266: Fixed missing bounds check in hdrblobInit (bsc#1183632).

Bugfixes:

- Fixed deadlock when multiple rpm processes tried to acquire the database lock (bsc#1183659).
</description>
</patchinfo>
openSUSE Build Service is sponsored by