[CLSA-2026:1777545003] rpm: Fix of CVE-2021-3521
Type:
security
Severity:
Moderate
Release date:
2026-05-02 01:16:46 UTC
Description:
- CVE-2021-3521: validate and require subkey binding signatures on PGP public keys
Updated packages:
  • rpm-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:9b535026bf3f920fb31e4b557072da4f93c0ad4e2a5a2e6e7f84a202c4e57273
  • rpm-apidocs-4.11.3-48.0.3.el7_9.tuxcare.els1.noarch.rpm
    sha:0c1c9ce63e0e4307969506b509fafdc0b94251dfdd6df0ec69844645b56dc48f
  • rpm-build-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:8c63f3f9c9bcba6e4407a207f50bcc4e1aaeb5db94e28033234b81e64772af20
  • rpm-build-libs-4.11.3-48.0.3.el7_9.tuxcare.els1.i686.rpm
    sha:e1d94e8249cbc168b0039669e53321d952c0838886b11c03433eb9233bd7c991
  • rpm-build-libs-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:b8c02af06da30dd3fae806e274b4384096f1877f705cb18c039f200fe599aa32
  • rpm-cron-4.11.3-48.0.3.el7_9.tuxcare.els1.noarch.rpm
    sha:cd7342e63c55d67b41c52126bdc4cf86f1bb6ca148bf98337a7e016a8103356b
  • rpm-devel-4.11.3-48.0.3.el7_9.tuxcare.els1.i686.rpm
    sha:32d7bf9338587716c8cde5f55071d5dd4f9454e8162fa17fb4bab8020b827040
  • rpm-devel-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:33d04ef9ed89ea2f1d858c8582c8231d5b593ac4230a0a952d93fa16b256c516
  • rpm-libs-4.11.3-48.0.3.el7_9.tuxcare.els1.i686.rpm
    sha:0a5f2271414ab791e34ee8ebef444cc346e4eeb35b72305cace63fcec3774a5e
  • rpm-libs-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:0b5d0fece9bb72cf2ce2c60637087a04b71ddab0cae058db262bd59a505c7012
  • rpm-plugin-systemd-inhibit-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:06e4201946190765039a0b3256ffb52ed3cdbbc5bf9ef2a7667575006fcb5f8a
  • rpm-python-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:efab3d99cbf845f42b63860b13296dc9473c0e23c7cf4a0efa3b776791776018
  • rpm-sign-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:209588a7369f4fa48628c334deb787a314e4190f1fb3cd95e88dc6bd88684dbf
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.