SUSE-SU-2021:2682-1: important: Security update for rpm

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu Aug 12 22:17:08 UTC 2021


   SUSE Security Update: Security update for rpm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2021:2682-1
Rating:             important
References:         #1179416 #1181805 #1183543 #1183545 ECO-3622 
                    SLE-17817 
Cross-References:   CVE-2021-20266 CVE-2021-20271 CVE-2021-3421
                   
CVSS scores:
                    CVE-2021-20266 (NVD) : 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-20266 (SUSE): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
                    CVE-2021-20271 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-20271 (SUSE): 3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L
                    CVE-2021-3421 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
                    CVE-2021-3421 (SUSE): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

Affected Products:
                    SUSE Linux Enterprise Module for SUSE Manager Server 4.2
                    SUSE Linux Enterprise Module for SUSE Manager Proxy 4.2
                    SUSE Linux Enterprise Module for Python2 15-SP3
                    SUSE Linux Enterprise Module for Public Cloud 15-SP3
                    SUSE Linux Enterprise Module for Development Tools 15-SP3
                    SUSE Linux Enterprise Module for Basesystem 15-SP3
______________________________________________________________________________

   An update that solves three vulnerabilities, contains two
   features and has one errata is now available.

Description:

   This update for rpm fixes the following issues:

   - Changed default package verification level to 'none' to be compatible to
     rpm-4.14.1
   - Made illegal obsoletes a warning
   - Fixed a potential access of freed mem in ndb's glue code (bsc#1179416)
   - Added support for enforcing signature policy and payload verification
     step to transactions (jsc#SLE-17817)
   - Added :humansi and :hmaniec query formatters for human readable output
   - Added query selectors for whatobsoletes and whatconflicts
   - Added support for sorting caret higher than base version
   - rpm does no longer require the signature header to be in a contiguous
     region when signing (bsc#1181805)

   Security fixes:

   - CVE-2021-3421: A flaw was found in the RPM package in the read
     functionality. This flaw allows an attacker who can convince a victim to
     install a seemingly verifiable package or compromise an RPM repository,
     to cause RPM database corruption. The highest threat from this
     vulnerability is to data integrity (bsc#1183543)

   - CVE-2021-20271: A flaw was found in RPM's signature check functionality
     when reading a package file. This flaw allows an attacker who can
     convince a victim to install a seemingly verifiable package, whose
     signature header was modified, to cause RPM database corruption and
     execute code. The highest threat from this vulnerability is to data
     integrity, confidentiality, and system availability (bsc#1183545)

   - CVE-2021-20266: A flaw was found in RPM's hdrblobInit() in lib/header.c.
     This flaw allows an attacker who can modify the rpmdb to cause an
     out-of-bounds read. The highest threat from this vulnerability is to
     system availability.


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for SUSE Manager Server 4.2:

      zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2682=1

   - SUSE Linux Enterprise Module for SUSE Manager Proxy 4.2:

      zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-2682=1

   - SUSE Linux Enterprise Module for Python2 15-SP3:

      zypper in -t patch SUSE-SLE-Module-Python2-15-SP3-2021-2682=1

   - SUSE Linux Enterprise Module for Public Cloud 15-SP3:

      zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2682=1

   - SUSE Linux Enterprise Module for Development Tools 15-SP3:

      zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2021-2682=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP3:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2021-2682=1



Package List:

   - SUSE Linux Enterprise Module for SUSE Manager Server 4.2 (aarch64 ppc64le s390x x86_64):

      rpm-build-4.14.3-37.2
      rpm-build-debuginfo-4.14.3-37.2
      rpm-debuginfo-4.14.3-37.2
      rpm-debugsource-4.14.3-37.2

   - SUSE Linux Enterprise Module for SUSE Manager Proxy 4.2 (aarch64 ppc64le s390x x86_64):

      rpm-build-4.14.3-37.2
      rpm-build-debuginfo-4.14.3-37.2
      rpm-debuginfo-4.14.3-37.2
      rpm-debugsource-4.14.3-37.2

   - SUSE Linux Enterprise Module for Python2 15-SP3 (aarch64 ppc64le s390x x86_64):

      python-rpm-debugsource-4.14.3-37.2
      python2-rpm-4.14.3-37.2
      python2-rpm-debuginfo-4.14.3-37.2

   - SUSE Linux Enterprise Module for Public Cloud 15-SP3 (aarch64 ppc64le s390x x86_64):

      rpm-ndb-4.14.3-37.2
      rpm-ndb-debuginfo-4.14.3-37.2
      rpm-ndb-debugsource-4.14.3-37.2

   - SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):

      rpm-build-4.14.3-37.2
      rpm-build-debuginfo-4.14.3-37.2
      rpm-debuginfo-4.14.3-37.2
      rpm-debugsource-4.14.3-37.2

   - SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):

      python-rpm-debugsource-4.14.3-37.2
      python3-rpm-4.14.3-37.2
      python3-rpm-debuginfo-4.14.3-37.2
      rpm-4.14.3-37.2
      rpm-debuginfo-4.14.3-37.2
      rpm-debugsource-4.14.3-37.2
      rpm-devel-4.14.3-37.2

   - SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64):

      rpm-32bit-4.14.3-37.2
      rpm-32bit-debuginfo-4.14.3-37.2


References:

   https://www.suse.com/security/cve/CVE-2021-20266.html
   https://www.suse.com/security/cve/CVE-2021-20271.html
   https://www.suse.com/security/cve/CVE-2021-3421.html
   https://bugzilla.suse.com/1179416
   https://bugzilla.suse.com/1181805
   https://bugzilla.suse.com/1183543
   https://bugzilla.suse.com/1183545



More information about the sle-updates mailing list