-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.3977
                            rpm security update
                             24 November 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           rpm
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Denial of Service               -- Existing Account
                   Access Confidential Data        -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-20271  

Reference:         ESB-2021.3448
                   ESB-2021.3141
                   ESB-2021.2959
                   ESB-2021.2897

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:4785
   https://access.redhat.com/errata/RHSA-2021:4771

Comment: This bulletin contains two (2) Red Hat security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: rpm security update
Advisory ID:       RHSA-2021:4785-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:4785
Issue date:        2021-11-23
CVE Names:         CVE-2021-20271 
=====================================================================

1. Summary:

An update for rpm is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64

3. Description:

The RPM Package Manager (RPM) is a command-line driven package management
system capable of installing, uninstalling, verifying, querying, and
updating software packages.

Security Fix(es):

* rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running applications linked against the RPM library must be restarted
for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1934125 - CVE-2021-20271 rpm: Signature checks bypass via corrupted rpm package

6. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source:
rpm-4.11.3-48.el7_9.src.rpm

x86_64:
rpm-4.11.3-48.el7_9.x86_64.rpm
rpm-build-4.11.3-48.el7_9.x86_64.rpm
rpm-build-libs-4.11.3-48.el7_9.i686.rpm
rpm-build-libs-4.11.3-48.el7_9.x86_64.rpm
rpm-debuginfo-4.11.3-48.el7_9.i686.rpm
rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm
rpm-libs-4.11.3-48.el7_9.i686.rpm
rpm-libs-4.11.3-48.el7_9.x86_64.rpm
rpm-python-4.11.3-48.el7_9.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

noarch:
rpm-apidocs-4.11.3-48.el7_9.noarch.rpm
rpm-cron-4.11.3-48.el7_9.noarch.rpm

x86_64:
rpm-debuginfo-4.11.3-48.el7_9.i686.rpm
rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm
rpm-devel-4.11.3-48.el7_9.i686.rpm
rpm-devel-4.11.3-48.el7_9.x86_64.rpm
rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.x86_64.rpm
rpm-sign-4.11.3-48.el7_9.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
rpm-4.11.3-48.el7_9.src.rpm

x86_64:
rpm-4.11.3-48.el7_9.x86_64.rpm
rpm-build-4.11.3-48.el7_9.x86_64.rpm
rpm-build-libs-4.11.3-48.el7_9.i686.rpm
rpm-build-libs-4.11.3-48.el7_9.x86_64.rpm
rpm-debuginfo-4.11.3-48.el7_9.i686.rpm
rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm
rpm-libs-4.11.3-48.el7_9.i686.rpm
rpm-libs-4.11.3-48.el7_9.x86_64.rpm
rpm-python-4.11.3-48.el7_9.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

noarch:
rpm-apidocs-4.11.3-48.el7_9.noarch.rpm
rpm-cron-4.11.3-48.el7_9.noarch.rpm

x86_64:
rpm-debuginfo-4.11.3-48.el7_9.i686.rpm
rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm
rpm-devel-4.11.3-48.el7_9.i686.rpm
rpm-devel-4.11.3-48.el7_9.x86_64.rpm
rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.x86_64.rpm
rpm-sign-4.11.3-48.el7_9.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
rpm-4.11.3-48.el7_9.src.rpm

ppc64:
rpm-4.11.3-48.el7_9.ppc64.rpm
rpm-build-4.11.3-48.el7_9.ppc64.rpm
rpm-build-libs-4.11.3-48.el7_9.ppc.rpm
rpm-build-libs-4.11.3-48.el7_9.ppc64.rpm
rpm-debuginfo-4.11.3-48.el7_9.ppc.rpm
rpm-debuginfo-4.11.3-48.el7_9.ppc64.rpm
rpm-devel-4.11.3-48.el7_9.ppc.rpm
rpm-devel-4.11.3-48.el7_9.ppc64.rpm
rpm-libs-4.11.3-48.el7_9.ppc.rpm
rpm-libs-4.11.3-48.el7_9.ppc64.rpm
rpm-python-4.11.3-48.el7_9.ppc64.rpm
rpm-sign-4.11.3-48.el7_9.ppc64.rpm

ppc64le:
rpm-4.11.3-48.el7_9.ppc64le.rpm
rpm-build-4.11.3-48.el7_9.ppc64le.rpm
rpm-build-libs-4.11.3-48.el7_9.ppc64le.rpm
rpm-debuginfo-4.11.3-48.el7_9.ppc64le.rpm
rpm-devel-4.11.3-48.el7_9.ppc64le.rpm
rpm-libs-4.11.3-48.el7_9.ppc64le.rpm
rpm-python-4.11.3-48.el7_9.ppc64le.rpm
rpm-sign-4.11.3-48.el7_9.ppc64le.rpm

s390x:
rpm-4.11.3-48.el7_9.s390x.rpm
rpm-build-4.11.3-48.el7_9.s390x.rpm
rpm-build-libs-4.11.3-48.el7_9.s390.rpm
rpm-build-libs-4.11.3-48.el7_9.s390x.rpm
rpm-debuginfo-4.11.3-48.el7_9.s390.rpm
rpm-debuginfo-4.11.3-48.el7_9.s390x.rpm
rpm-devel-4.11.3-48.el7_9.s390.rpm
rpm-devel-4.11.3-48.el7_9.s390x.rpm
rpm-libs-4.11.3-48.el7_9.s390.rpm
rpm-libs-4.11.3-48.el7_9.s390x.rpm
rpm-python-4.11.3-48.el7_9.s390x.rpm
rpm-sign-4.11.3-48.el7_9.s390x.rpm

x86_64:
rpm-4.11.3-48.el7_9.x86_64.rpm
rpm-build-4.11.3-48.el7_9.x86_64.rpm
rpm-build-libs-4.11.3-48.el7_9.i686.rpm
rpm-build-libs-4.11.3-48.el7_9.x86_64.rpm
rpm-debuginfo-4.11.3-48.el7_9.i686.rpm
rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm
rpm-devel-4.11.3-48.el7_9.i686.rpm
rpm-devel-4.11.3-48.el7_9.x86_64.rpm
rpm-libs-4.11.3-48.el7_9.i686.rpm
rpm-libs-4.11.3-48.el7_9.x86_64.rpm
rpm-python-4.11.3-48.el7_9.x86_64.rpm
rpm-sign-4.11.3-48.el7_9.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

noarch:
rpm-apidocs-4.11.3-48.el7_9.noarch.rpm
rpm-cron-4.11.3-48.el7_9.noarch.rpm

ppc64:
rpm-debuginfo-4.11.3-48.el7_9.ppc64.rpm
rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.ppc64.rpm

ppc64le:
rpm-debuginfo-4.11.3-48.el7_9.ppc64le.rpm
rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.ppc64le.rpm

s390x:
rpm-debuginfo-4.11.3-48.el7_9.s390x.rpm
rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.s390x.rpm

x86_64:
rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm
rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
rpm-4.11.3-48.el7_9.src.rpm

x86_64:
rpm-4.11.3-48.el7_9.x86_64.rpm
rpm-build-4.11.3-48.el7_9.x86_64.rpm
rpm-build-libs-4.11.3-48.el7_9.i686.rpm
rpm-build-libs-4.11.3-48.el7_9.x86_64.rpm
rpm-debuginfo-4.11.3-48.el7_9.i686.rpm
rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm
rpm-devel-4.11.3-48.el7_9.i686.rpm
rpm-devel-4.11.3-48.el7_9.x86_64.rpm
rpm-libs-4.11.3-48.el7_9.i686.rpm
rpm-libs-4.11.3-48.el7_9.x86_64.rpm
rpm-python-4.11.3-48.el7_9.x86_64.rpm
rpm-sign-4.11.3-48.el7_9.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

noarch:
rpm-apidocs-4.11.3-48.el7_9.noarch.rpm
rpm-cron-4.11.3-48.el7_9.noarch.rpm

x86_64:
rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm
rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-20271
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=J3KR
- -----END PGP SIGNATURE-----

- -------------------------------------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: rpm security update
Advisory ID:       RHSA-2021:4771-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:4771
Issue date:        2021-11-23
CVE Names:         CVE-2021-20271 
=====================================================================

1. Summary:

An update for rpm is now available for Red Hat Enterprise Linux 7.6
Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update
Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP
Solutions.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 7.6) - x86_64
Red Hat Enterprise Linux Server E4S (v. 7.6) - ppc64le, x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 7.6) - noarch, x86_64
Red Hat Enterprise Linux Server Optional E4S (v. 7.6) - noarch, ppc64le, x86_64
Red Hat Enterprise Linux Server Optional TUS (v. 7.6) - noarch, x86_64
Red Hat Enterprise Linux Server TUS (v. 7.6) - x86_64

3. Description:

The RPM Package Manager (RPM) is a command-line driven package management
system capable of installing, uninstalling, verifying, querying, and
updating software packages.

Security Fix(es):

* rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running applications linked against the RPM library must be restarted
for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1934125 - CVE-2021-20271 rpm: Signature checks bypass via corrupted rpm package

6. Package List:

Red Hat Enterprise Linux Server AUS (v. 7.6):

Source:
rpm-4.11.3-35.el7_6.2.src.rpm

x86_64:
rpm-4.11.3-35.el7_6.2.x86_64.rpm
rpm-build-4.11.3-35.el7_6.2.x86_64.rpm
rpm-build-libs-4.11.3-35.el7_6.2.i686.rpm
rpm-build-libs-4.11.3-35.el7_6.2.x86_64.rpm
rpm-debuginfo-4.11.3-35.el7_6.2.i686.rpm
rpm-debuginfo-4.11.3-35.el7_6.2.x86_64.rpm
rpm-devel-4.11.3-35.el7_6.2.i686.rpm
rpm-devel-4.11.3-35.el7_6.2.x86_64.rpm
rpm-libs-4.11.3-35.el7_6.2.i686.rpm
rpm-libs-4.11.3-35.el7_6.2.x86_64.rpm
rpm-python-4.11.3-35.el7_6.2.x86_64.rpm
rpm-sign-4.11.3-35.el7_6.2.x86_64.rpm

Red Hat Enterprise Linux Server E4S (v. 7.6):

Source:
rpm-4.11.3-35.el7_6.2.src.rpm

ppc64le:
rpm-4.11.3-35.el7_6.2.ppc64le.rpm
rpm-build-4.11.3-35.el7_6.2.ppc64le.rpm
rpm-build-libs-4.11.3-35.el7_6.2.ppc64le.rpm
rpm-debuginfo-4.11.3-35.el7_6.2.ppc64le.rpm
rpm-devel-4.11.3-35.el7_6.2.ppc64le.rpm
rpm-libs-4.11.3-35.el7_6.2.ppc64le.rpm
rpm-python-4.11.3-35.el7_6.2.ppc64le.rpm
rpm-sign-4.11.3-35.el7_6.2.ppc64le.rpm

x86_64:
rpm-4.11.3-35.el7_6.2.x86_64.rpm
rpm-build-4.11.3-35.el7_6.2.x86_64.rpm
rpm-build-libs-4.11.3-35.el7_6.2.i686.rpm
rpm-build-libs-4.11.3-35.el7_6.2.x86_64.rpm
rpm-debuginfo-4.11.3-35.el7_6.2.i686.rpm
rpm-debuginfo-4.11.3-35.el7_6.2.x86_64.rpm
rpm-devel-4.11.3-35.el7_6.2.i686.rpm
rpm-devel-4.11.3-35.el7_6.2.x86_64.rpm
rpm-libs-4.11.3-35.el7_6.2.i686.rpm
rpm-libs-4.11.3-35.el7_6.2.x86_64.rpm
rpm-python-4.11.3-35.el7_6.2.x86_64.rpm
rpm-sign-4.11.3-35.el7_6.2.x86_64.rpm

Red Hat Enterprise Linux Server TUS (v. 7.6):

Source:
rpm-4.11.3-35.el7_6.2.src.rpm

x86_64:
rpm-4.11.3-35.el7_6.2.x86_64.rpm
rpm-build-4.11.3-35.el7_6.2.x86_64.rpm
rpm-build-libs-4.11.3-35.el7_6.2.i686.rpm
rpm-build-libs-4.11.3-35.el7_6.2.x86_64.rpm
rpm-debuginfo-4.11.3-35.el7_6.2.i686.rpm
rpm-debuginfo-4.11.3-35.el7_6.2.x86_64.rpm
rpm-devel-4.11.3-35.el7_6.2.i686.rpm
rpm-devel-4.11.3-35.el7_6.2.x86_64.rpm
rpm-libs-4.11.3-35.el7_6.2.i686.rpm
rpm-libs-4.11.3-35.el7_6.2.x86_64.rpm
rpm-python-4.11.3-35.el7_6.2.x86_64.rpm
rpm-sign-4.11.3-35.el7_6.2.x86_64.rpm

Red Hat Enterprise Linux Server Optional AUS (v. 7.6):

noarch:
rpm-apidocs-4.11.3-35.el7_6.2.noarch.rpm
rpm-cron-4.11.3-35.el7_6.2.noarch.rpm

x86_64:
rpm-debuginfo-4.11.3-35.el7_6.2.x86_64.rpm
rpm-plugin-systemd-inhibit-4.11.3-35.el7_6.2.x86_64.rpm

Red Hat Enterprise Linux Server Optional E4S (v. 7.6):

noarch:
rpm-apidocs-4.11.3-35.el7_6.2.noarch.rpm
rpm-cron-4.11.3-35.el7_6.2.noarch.rpm

ppc64le:
rpm-debuginfo-4.11.3-35.el7_6.2.ppc64le.rpm
rpm-plugin-systemd-inhibit-4.11.3-35.el7_6.2.ppc64le.rpm

x86_64:
rpm-debuginfo-4.11.3-35.el7_6.2.x86_64.rpm
rpm-plugin-systemd-inhibit-4.11.3-35.el7_6.2.x86_64.rpm

Red Hat Enterprise Linux Server Optional TUS (v. 7.6):

noarch:
rpm-apidocs-4.11.3-35.el7_6.2.noarch.rpm
rpm-cron-4.11.3-35.el7_6.2.noarch.rpm

x86_64:
rpm-debuginfo-4.11.3-35.el7_6.2.x86_64.rpm
rpm-plugin-systemd-inhibit-4.11.3-35.el7_6.2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-20271
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=I2gA
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=yf03
-----END PGP SIGNATURE-----