Security update for rpm
Announcement ID: | SUSE-SU-2021:2682-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves three vulnerabilities, contains two features and has one security fix can now be installed.
Description:
This update for rpm fixes the following issues:
- Changed default package verification level to 'none' to be compatible to rpm-4.14.1
- Made illegal obsoletes a warning
- Fixed a potential access of freed mem in ndb's glue code (bsc#1179416)
- Added support for enforcing signature policy and payload verification step to transactions (jsc#SLE-17817)
- Added :humansi and :hmaniec query formatters for human readable output
- Added query selectors for whatobsoletes and whatconflicts
- Added support for sorting caret higher than base version
- rpm does no longer require the signature header to be in a contiguous region when signing (bsc#1181805)
Security fixes:
-
CVE-2021-3421: A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity (bsc#1183543)
-
CVE-2021-20271: A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability (bsc#1183545)
-
CVE-2021-20266: A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.
Special Instructions and Notes:
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.3
zypper in -t patch SUSE-2021-2682=1
-
Basesystem Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2021-2682=1
-
Development Tools Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2021-2682=1
-
Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2682=1
-
Python 2 Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Python2-15-SP3-2021-2682=1
-
SUSE Manager Proxy 4.2 Module 4.2
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-2682=1
-
SUSE Manager Server 4.2 Module 4.2
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2682=1
Package List:
-
openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
- rpm-build-4.14.3-37.2
- rpm-debuginfo-4.14.3-37.2
- python2-rpm-debuginfo-4.14.3-37.2
- rpm-build-debuginfo-4.14.3-37.2
- rpm-ndb-debugsource-4.14.3-37.2
- rpm-debugsource-4.14.3-37.2
- rpm-4.14.3-37.2
- python3-rpm-debuginfo-4.14.3-37.2
- python3-rpm-4.14.3-37.2
- rpm-ndb-debuginfo-4.14.3-37.2
- python-rpm-debugsource-4.14.3-37.2
- rpm-devel-4.14.3-37.2
- rpm-ndb-4.14.3-37.2
- python2-rpm-4.14.3-37.2
-
openSUSE Leap 15.3 (x86_64)
- rpm-32bit-debuginfo-4.14.3-37.2
- rpm-32bit-4.14.3-37.2
- rpm-ndb-32bit-debuginfo-4.14.3-37.2
- rpm-ndb-32bit-4.14.3-37.2
-
openSUSE Leap 15.3 (aarch64_ilp32)
- rpm-ndb-64bit-4.14.3-37.2
- rpm-64bit-debuginfo-4.14.3-37.2
- rpm-64bit-4.14.3-37.2
- rpm-ndb-64bit-debuginfo-4.14.3-37.2
-
Basesystem Module 15-SP3 (aarch64 ppc64le s390x x86_64)
- rpm-debuginfo-4.14.3-37.2
- rpm-4.14.3-37.2
- python3-rpm-debuginfo-4.14.3-37.2
- python3-rpm-4.14.3-37.2
- python-rpm-debugsource-4.14.3-37.2
- rpm-devel-4.14.3-37.2
- rpm-debugsource-4.14.3-37.2
-
Basesystem Module 15-SP3 (x86_64)
- rpm-32bit-4.14.3-37.2
- rpm-32bit-debuginfo-4.14.3-37.2
-
Development Tools Module 15-SP3 (aarch64 ppc64le s390x x86_64)
- rpm-build-debuginfo-4.14.3-37.2
- rpm-build-4.14.3-37.2
- rpm-debuginfo-4.14.3-37.2
- rpm-debugsource-4.14.3-37.2
-
Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64)
- rpm-ndb-debuginfo-4.14.3-37.2
- rpm-ndb-debugsource-4.14.3-37.2
- rpm-ndb-4.14.3-37.2
-
Python 2 Module 15-SP3 (aarch64 ppc64le s390x x86_64)
- python-rpm-debugsource-4.14.3-37.2
- python2-rpm-4.14.3-37.2
- python2-rpm-debuginfo-4.14.3-37.2
-
SUSE Manager Proxy 4.2 Module 4.2 (aarch64 ppc64le s390x x86_64)
- rpm-build-debuginfo-4.14.3-37.2
- rpm-build-4.14.3-37.2
- rpm-debuginfo-4.14.3-37.2
- rpm-debugsource-4.14.3-37.2
-
SUSE Manager Server 4.2 Module 4.2 (aarch64 ppc64le s390x x86_64)
- rpm-build-debuginfo-4.14.3-37.2
- rpm-build-4.14.3-37.2
- rpm-debuginfo-4.14.3-37.2
- rpm-debugsource-4.14.3-37.2
References:
- https://www.suse.com/security/cve/CVE-2021-20266.html
- https://www.suse.com/security/cve/CVE-2021-20271.html
- https://www.suse.com/security/cve/CVE-2021-3421.html
- https://bugzilla.suse.com/show_bug.cgi?id=1179416
- https://bugzilla.suse.com/show_bug.cgi?id=1181805
- https://bugzilla.suse.com/show_bug.cgi?id=1183543
- https://bugzilla.suse.com/show_bug.cgi?id=1183545
- https://jira.suse.com/browse/ECO-3622
- https://jira.suse.com/browse/SLE-17817