CVE-2011-3378

NameCVE-2011-3378
DescriptionRPM 4.4.x through 4.9.x, probably before 4.9.1.2, allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via an rpm package with crafted headers and offsets that are not properly handled when a package is queried or installed, related to (1) the regionSwab function, (2) the headerLoad function, and (3) multiple functions in rpmio/rpmpgp.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs645325

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rpm (PTS)buster4.14.2.1+dfsg1-1fixed
bullseye4.16.1.2+dfsg1-3fixed
bookworm4.18.0+dfsg-1+deb12u1fixed
trixie4.18.2+dfsg-2fixed
sid4.18.2+dfsg-2.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rpmsourcesqueeze4.8.1-6+squeeze1
rpmsource(unstable)4.9.1.2-1low645325

Notes

[lenny] - rpm <no-dsa> (rpm isn't used a a package manager, very limited attack vector)

Search for package or bug name: Reporting problems