Security update for rpm
Announcement ID: | SUSE-SU-2022:3939-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves three vulnerabilities and has three security fixes can now be installed.
Description:
This update for rpm fixes the following issues:
- Fixed PGP parsing bugs (bsc#1185299).
- Fixed various format handling bugs (bsc#996280).
- CVE-2021-3421: Fixed vulnerability where unsigned headers could be injected into the rpm database (bsc#1183543).
- CVE-2021-20271: Fixed vulnerability where a corrupted rpm could corrupt the rpm database (bsc#1183545).
- CVE-2021-20266: Fixed missing bounds check in hdrblobInit (bsc#1183632).
Bugfixes:
- Fixed deadlock when multiple rpm processes tried to acquire the database lock (bsc#1183659).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Software Development Kit 12 SP5
zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-3939=1
-
SUSE Linux Enterprise High Performance Computing 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-3939=1
-
SUSE Linux Enterprise Server 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-3939=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-3939=1
Package List:
-
SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64)
- rpm-devel-4.11.2-16.26.1
- rpm-debuginfo-4.11.2-16.26.1
- rpm-debugsource-4.11.2-16.26.1
-
SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
- python3-rpm-debugsource-4.11.2-16.26.1
- python3-rpm-debuginfo-4.11.2-16.26.1
- rpm-build-debuginfo-4.11.2-16.26.1
- rpm-python-debugsource-4.11.2-16.26.1
- rpm-build-4.11.2-16.26.1
- rpm-debuginfo-4.11.2-16.26.1
- rpm-debugsource-4.11.2-16.26.1
- rpm-4.11.2-16.26.1
- python3-rpm-4.11.2-16.26.1
- rpm-python-debuginfo-4.11.2-16.26.1
- rpm-python-4.11.2-16.26.1
-
SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64)
- rpm-32bit-4.11.2-16.26.1
- rpm-debuginfo-32bit-4.11.2-16.26.1
-
SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
- python3-rpm-debugsource-4.11.2-16.26.1
- python3-rpm-debuginfo-4.11.2-16.26.1
- rpm-build-debuginfo-4.11.2-16.26.1
- rpm-python-debugsource-4.11.2-16.26.1
- rpm-build-4.11.2-16.26.1
- rpm-debuginfo-4.11.2-16.26.1
- rpm-debugsource-4.11.2-16.26.1
- rpm-4.11.2-16.26.1
- python3-rpm-4.11.2-16.26.1
- rpm-python-debuginfo-4.11.2-16.26.1
- rpm-python-4.11.2-16.26.1
-
SUSE Linux Enterprise Server 12 SP5 (s390x x86_64)
- rpm-32bit-4.11.2-16.26.1
- rpm-debuginfo-32bit-4.11.2-16.26.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
- python3-rpm-debugsource-4.11.2-16.26.1
- python3-rpm-debuginfo-4.11.2-16.26.1
- rpm-build-debuginfo-4.11.2-16.26.1
- rpm-python-debugsource-4.11.2-16.26.1
- rpm-build-4.11.2-16.26.1
- rpm-debuginfo-4.11.2-16.26.1
- rpm-debugsource-4.11.2-16.26.1
- rpm-4.11.2-16.26.1
- python3-rpm-4.11.2-16.26.1
- rpm-python-debuginfo-4.11.2-16.26.1
- rpm-python-4.11.2-16.26.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64)
- rpm-32bit-4.11.2-16.26.1
- rpm-debuginfo-32bit-4.11.2-16.26.1
References:
- https://www.suse.com/security/cve/CVE-2021-20266.html
- https://www.suse.com/security/cve/CVE-2021-20271.html
- https://www.suse.com/security/cve/CVE-2021-3421.html
- https://bugzilla.suse.com/show_bug.cgi?id=1183543
- https://bugzilla.suse.com/show_bug.cgi?id=1183545
- https://bugzilla.suse.com/show_bug.cgi?id=1183632
- https://bugzilla.suse.com/show_bug.cgi?id=1183659
- https://bugzilla.suse.com/show_bug.cgi?id=1185299
- https://bugzilla.suse.com/show_bug.cgi?id=996280