A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
| Software | From | Fixed in |
|---|---|---|
| rpm / rpm | 4.16.0-beta2 | 4.16.0-beta2.x |
| rpm / rpm | 4.16.0-beta3 | 4.16.0-beta3.x |
| rpm / rpm | 4.16.0-rc1 | 4.16.0-rc1.x |
| rpm / rpm | 4.16.0-alpha | 4.16.0-alpha.x |
| rpm / rpm | 4.15.0-beta1 | 4.15.0-beta1.x |
| rpm / rpm | 4.15.0-rc1 | 4.15.0-rc1.x |
| rpm / rpm | 4.15.0-alpha | 4.15.0-alpha.x |
| rpm / rpm | 4.15.0 | 4.15.1.3 |
| rpm / rpm | 4.16.0 | 4.16.1.3 |
| redhat / enterprise_linux | 8.0 | 8.0.x |
| fedoraproject / fedora | 32 | 32.x |
| fedoraproject / fedora | 33 | 33.x |
| fedoraproject / fedora | 34 | 34.x |
| starwindsoftware / starwind_virtual_san | 8-build14398 | 8-build14398.x |