vulnerability

Red Hat: CVE-2021-20271: CVE-2021-20271 rpm: Signature checks bypass via corrupted rpm package (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Published
Mar 26, 2021
Added
Jun 30, 2021
Modified
Aug 11, 2025

Description

A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.

Solutions

no-fix-redhat-rpm-packageredhat-upgrade-python3-rpmredhat-upgrade-python3-rpm-debuginforedhat-upgrade-rpmredhat-upgrade-rpm-apidocsredhat-upgrade-rpm-buildredhat-upgrade-rpm-build-debuginforedhat-upgrade-rpm-build-libsredhat-upgrade-rpm-build-libs-debuginforedhat-upgrade-rpm-cronredhat-upgrade-rpm-debuginforedhat-upgrade-rpm-debugsourceredhat-upgrade-rpm-develredhat-upgrade-rpm-devel-debuginforedhat-upgrade-rpm-libsredhat-upgrade-rpm-libs-debuginforedhat-upgrade-rpm-plugin-fapolicydredhat-upgrade-rpm-plugin-fapolicyd-debuginforedhat-upgrade-rpm-plugin-imaredhat-upgrade-rpm-plugin-ima-debuginforedhat-upgrade-rpm-plugin-prioresetredhat-upgrade-rpm-plugin-prioreset-debuginforedhat-upgrade-rpm-plugin-selinuxredhat-upgrade-rpm-plugin-selinux-debuginforedhat-upgrade-rpm-plugin-syslogredhat-upgrade-rpm-plugin-syslog-debuginforedhat-upgrade-rpm-plugin-systemd-inhibitredhat-upgrade-rpm-plugin-systemd-inhibit-debuginforedhat-upgrade-rpm-pythonredhat-upgrade-rpm-signredhat-upgrade-rpm-sign-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.