CVE-2021-3521Improper Verification of Cryptographic Signature in RPM

Severity
4.7MEDIUMNVD
EPSS
0.0%
top 95.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 22
Latest updateAug 23

Description

There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature." RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity. To exploit this flaw, an attacker must either compromise an RPM repository

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 1.0 | Impact: 3.6

Affected Packages6 packages

NVDrpm/rpm< 4.17.1
debiandebian/rpm< rpm 4.18.0+dfsg-1 (bookworm)
Debianrpm/rpm< 4.18.0+dfsg-1+2
CVEListV5rpm/rpmFixed in rpm-4.18.0-beta1, rpm-4.18.0-alpha2, rpm-4.18.0-alpha1 .

Patches

🔴Vulnerability Details

2
GHSA
GHSA-pr6x-p264-jrpq: There is a flaw in RPM's signature functionality2022-08-23
OSV
CVE-2021-3521: There is a flaw in RPM's signature functionality2022-08-22

📋Vendor Advisories

4
Microsoft
There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature." RPM does not check the binding signature of subkeys prior to importing th2022-08-09
Oracle
Oracle Oracle Communications Risk Matrix: OC-CNE (rpm) — CVE-2021-35212022-04-15
Red Hat
rpm: RPM does not require subkeys to have a valid binding signature2021-09-28
Debian
CVE-2021-3521: rpm - There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated...2021