{
  "threat_severity" : "Moderate",
  "public_date" : "2021-03-11T22:51:00Z",
  "bugzilla" : {
    "description" : "rpm: unsigned signature header leads to string injection into an rpm database",
    "id" : "1927747",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.7",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-347",
  "details" : [ "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.", "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity." ],
  "statement" : "To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM.  It is strongly recommended to only use RPMs from trusted repositories.",
  "acknowledgement" : "Red Hat would like to thank Demi M. Obenour for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2021-06-29T00:00:00Z",
    "advisory" : "RHSA-2021:2574",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "rpm-0:4.14.3-14.el8_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2021-06-29T00:00:00Z",
    "advisory" : "RHSA-2021:2574",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "rpm-0:4.14.3-14.el8_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Extended Update Support",
    "release_date" : "2021-07-20T00:00:00Z",
    "advisory" : "RHSA-2021:2791",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.2",
    "package" : "rpm-0:4.14.2-38.el8_2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "rpm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "rpm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "rpm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2021-3421\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-3421" ],
  "name" : "CVE-2021-3421",
  "csaw" : false
}