{"schema_version":"1.7.2","id":"OESA-2021-1431","modified":"2021-11-12T11:03:21Z","published":"2021-11-12T11:03:21Z","upstream":["CVE-2021-3521"],"summary":"rpm security update","details":"The RPM Package Manager (RPM) is a powerful package management system capability as below\r\n\r\nSecurity Fix(es):\r\n\r\nThe OpenPGP subkey is associated with the master key through a binding signature. RPM will not check their binding signature before importing the subkey; if the attacker can add it or the other party of social engineering adds the malicious subkey to the legal public Key, RPM may mistakenly trust malicious signatures.(CVE-2021-3521)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"rpm","purl":"pkg:rpm/openEuler/rpm\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.1-26.oe1"}]}],"ecosystem_specific":{"aarch64":["rpm-4.15.1-26.oe1.aarch64.rpm","rpm-plugin-systemd-inhibit-4.15.1-26.oe1.aarch64.rpm","python2-rpm-4.15.1-26.oe1.aarch64.rpm","python3-rpm-4.15.1-26.oe1.aarch64.rpm","rpm-libs-4.15.1-26.oe1.aarch64.rpm","rpm-debugsource-4.15.1-26.oe1.aarch64.rpm","rpm-devel-4.15.1-26.oe1.aarch64.rpm","rpm-build-4.15.1-26.oe1.aarch64.rpm","rpm-debuginfo-4.15.1-26.oe1.aarch64.rpm"],"noarch":["rpm-help-4.15.1-26.oe1.noarch.rpm"],"src":["rpm-4.15.1-26.oe1.src.rpm"],"x86_64":["python2-rpm-4.15.1-26.oe1.x86_64.rpm","rpm-debuginfo-4.15.1-26.oe1.x86_64.rpm","rpm-debugsource-4.15.1-26.oe1.x86_64.rpm","rpm-build-4.15.1-26.oe1.x86_64.rpm","python3-rpm-4.15.1-26.oe1.x86_64.rpm","rpm-devel-4.15.1-26.oe1.x86_64.rpm","rpm-plugin-systemd-inhibit-4.15.1-26.oe1.x86_64.rpm","rpm-4.15.1-26.oe1.x86_64.rpm","rpm-libs-4.15.1-26.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP2","name":"rpm","purl":"pkg:rpm/openEuler/rpm\u0026distro=openEuler-20.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.1-30.oe1"}]}],"ecosystem_specific":{"aarch64":["rpm-debugsource-4.15.1-30.oe1.aarch64.rpm","rpm-libs-4.15.1-30.oe1.aarch64.rpm","python2-rpm-4.15.1-30.oe1.aarch64.rpm","rpm-plugin-systemd-inhibit-4.15.1-30.oe1.aarch64.rpm","rpm-devel-4.15.1-30.oe1.aarch64.rpm","rpm-build-4.15.1-30.oe1.aarch64.rpm","rpm-4.15.1-30.oe1.aarch64.rpm","python3-rpm-4.15.1-30.oe1.aarch64.rpm","rpm-debuginfo-4.15.1-30.oe1.aarch64.rpm"],"noarch":["rpm-help-4.15.1-30.oe1.noarch.rpm"],"src":["rpm-4.15.1-30.oe1.src.rpm"],"x86_64":["rpm-plugin-systemd-inhibit-4.15.1-30.oe1.x86_64.rpm","python3-rpm-4.15.1-30.oe1.x86_64.rpm","rpm-4.15.1-30.oe1.x86_64.rpm","rpm-libs-4.15.1-30.oe1.x86_64.rpm","python2-rpm-4.15.1-30.oe1.x86_64.rpm","rpm-debuginfo-4.15.1-30.oe1.x86_64.rpm","rpm-build-4.15.1-30.oe1.x86_64.rpm","rpm-devel-4.15.1-30.oe1.x86_64.rpm","rpm-debugsource-4.15.1-30.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1431"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3521"}],"database_specific":{"severity":"Low"}}