ALAS-2021-1521

Affecting rpm-python27 package, versions <4.11.3-40.79.amzn1

Report new vulnerabilities
medium severity
Do your applications use this vulnerable package? Test your applications

NVD Description

Note: Versions mentioned in the description apply to the upstream rpm-python27 package. See Remediation section below for Amazon-Linux:2018.03 relevant versions.

Package updates are available for Amazon Linux AMI that fix the following vulnerabilities: CVE-2021-3421: A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. 1927747: CVE-2021-3421 rpm: unsigned signature header leads to string injection into an rpm database CVE-2021-20271: 1934125: CVE-2021-20271 rpm: Signature checks bypass via corrupted rpm package A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.

Remediation

Upgrade Amazon-Linux:2018.03 rpm-python27 to version 4.11.3-40.79.amzn1 or higher.
This issue was patched in None.

References

CVE
ALAS-2021-1521
Snyk ID
SNYK-AMZN201803-RPMPYTHON27-1316514
Published
13 Jul, 2021