File _patchinfo of Package patchinfo.25783
<patchinfo incident="25783">
<issue tracker="bnc" id="1183543">VUL-0: CVE-2021-3421: rpm: unsigned signature header leads to string injection into an rpm database</issue>
<issue tracker="bnc" id="1185299">VUL-0: rpm: There are several issues in RPM</issue>
<issue tracker="bnc" id="1183659">L3: rpmdb corruption on rpm --import</issue>
<issue tracker="bnc" id="1183545">VUL-0: CVE-2021-20271: rpm: Signature checks bypass via corrupted rpm package</issue>
<issue tracker="bnc" id="996280">VUL-0: rpm: multiple vulnerabilities in RPM</issue>
<issue tracker="bnc" id="1183632">VUL-1: CVE-2021-20266: rpm: missing length checks in hdrblobInit()</issue>
<issue tracker="cve" id="2021-20266"/>
<issue tracker="cve" id="2021-20271"/>
<issue tracker="cve" id="2021-3421"/>
<packager>mlschroe</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for rpm</summary>
<description>This update for rpm fixes the following issues:
- Fixed PGP parsing bugs (bsc#1185299).
- Fixed various format handling bugs (bsc#996280).
- CVE-2021-3421: Fixed vulnerability where unsigned headers could be injected into the rpm database (bsc#1183543).
- CVE-2021-20271: Fixed vulnerability where a corrupted rpm could corrupt the rpm database (bsc#1183545).
- CVE-2021-20266: Fixed missing bounds check in hdrblobInit (bsc#1183632).
Bugfixes:
- Fixed deadlock when multiple rpm processes tried to acquire the database lock (bsc#1183659).
</description>
</patchinfo>