vulnerability
Red Hat: CVE-2021-3445: Signature verification bypass via signature placed in the main RPM header (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:H/Au:N/C:P/I:P/A:P) | May 19, 2021 | Nov 10, 2021 | Aug 11, 2025 |
Severity
5
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Published
May 19, 2021
Added
Nov 10, 2021
Modified
Aug 11, 2025
Description
A flaw was found in libdnf's signature verification functionality in versions before 0.60.1. This flaw allows an attacker to achieve code execution if they can alter the header information of an RPM package and then trick a user or system into installing it. The highest risk of this vulnerability is to confidentiality, integrity, as well as system availability.
Solutions
redhat-upgrade-dnfredhat-upgrade-dnf-automaticredhat-upgrade-dnf-dataredhat-upgrade-dnf-plugins-coreredhat-upgrade-libdnfredhat-upgrade-libdnf-debuginforedhat-upgrade-libdnf-debugsourceredhat-upgrade-libdnf-develredhat-upgrade-python3-dnfredhat-upgrade-python3-dnf-plugin-post-transaction-actionsredhat-upgrade-python3-dnf-plugin-versionlockredhat-upgrade-python3-dnf-plugins-coreredhat-upgrade-python3-hawkeyredhat-upgrade-python3-hawkey-debuginforedhat-upgrade-python3-libdnfredhat-upgrade-python3-libdnf-debuginforedhat-upgrade-yumredhat-upgrade-yum-utils
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.