{"schema_version":"1.7.2","id":"OESA-2021-1163","modified":"2021-05-06T11:02:51Z","published":"2021-05-06T11:02:51Z","upstream":["CVE-2021-20271"],"summary":"rpm security update","details":"The RPM Package Manager (RPM) is a powerful package management system capability as below\n-building computer software from source into easily distributable packages\n-installing, updating and uninstalling packaged software\n-querying detailed information about the packaged software, whether installed or not\n-verifying integrity of packaged software and resulting software installation\r\n\r\nSecurity Fix(es):\r\n\r\nA flaw was found in RPM\u0026apos;s signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.(CVE-2021-20271)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"rpm","purl":"pkg:rpm/openEuler/rpm\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.1-20.oe1"}]}],"ecosystem_specific":{"aarch64":["rpm-build-4.15.1-20.oe1.aarch64.rpm","rpm-libs-4.15.1-20.oe1.aarch64.rpm","rpm-4.15.1-20.oe1.aarch64.rpm","python3-rpm-4.15.1-20.oe1.aarch64.rpm","python2-rpm-4.15.1-20.oe1.aarch64.rpm","rpm-debuginfo-4.15.1-20.oe1.aarch64.rpm","rpm-debugsource-4.15.1-20.oe1.aarch64.rpm","rpm-devel-4.15.1-20.oe1.aarch64.rpm"],"noarch":["rpm-help-4.15.1-20.oe1.noarch.rpm"],"src":["rpm-4.15.1-20.oe1.src.rpm"],"x86_64":["rpm-debugsource-4.15.1-20.oe1.x86_64.rpm","rpm-debuginfo-4.15.1-20.oe1.x86_64.rpm","rpm-devel-4.15.1-20.oe1.x86_64.rpm","python2-rpm-4.15.1-20.oe1.x86_64.rpm","rpm-build-4.15.1-20.oe1.x86_64.rpm","python3-rpm-4.15.1-20.oe1.x86_64.rpm","rpm-4.15.1-20.oe1.x86_64.rpm","rpm-libs-4.15.1-20.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1163"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20271"}],"database_specific":{"severity":"High"}}