[CLSA-2026:1777737217] rpm: Fix of CVE-2021-3521
Type:
security
Severity:
Moderate
Release date:
2026-05-06 07:07:37 UTC
Description:
- CVE-2021-3521: validate and require subkey binding signatures on PGP public keys
Updated packages:
  • rpm-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:f2e1b2a0e0278d4bf37757fdb9d3560f7f78f7b5bba675cd8a67c58e5a13777e
  • rpm-apidocs-4.11.3-48.0.3.el7_9.tuxcare.els1.noarch.rpm
    sha:e0739e7e99e010dccf4b2b0130a6754673c8c258eb2379c7c50957ed0ee72d87
  • rpm-build-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:cb7092fd8adb44b2aa17d11d634ceda085ae18292b9a29ab1dc87a8ecd5faca8
  • rpm-build-libs-4.11.3-48.0.3.el7_9.tuxcare.els1.i686.rpm
    sha:dcb8fb61fecb09aee664ba766ca750eaa24798f51e6c21c15fb5533ff273fa8b
  • rpm-build-libs-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:292222b6fef6a3eeb28363841cfbd27cf3c914543ec591ee37834bb5da2c0145
  • rpm-cron-4.11.3-48.0.3.el7_9.tuxcare.els1.noarch.rpm
    sha:b50952eafe1121171e52dab446e7951788cd109fb13d9d2ad3701f4e3398d768
  • rpm-devel-4.11.3-48.0.3.el7_9.tuxcare.els1.i686.rpm
    sha:af679a96d010f6882e74557f9eef6224dc502aadfa4cd0dbd04dc5cd596de4a6
  • rpm-devel-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:e3cc054761c598f766799d03ad2fca58986ea663ea010ce7c72b7e93ea8b58c8
  • rpm-libs-4.11.3-48.0.3.el7_9.tuxcare.els1.i686.rpm
    sha:e338196f4b8d19770fe71f35f120f938c86e335044847555b5992d80a12238ec
  • rpm-libs-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:69e9ffc88fb35ea9f28353d907fe5f9f056b21d07dbd1740df43e37b89ce534c
  • rpm-plugin-systemd-inhibit-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:bf89711d05b310d2355d950c8b834867aca379f6a8c7d2c403faaff84a566d33
  • rpm-python-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:8892818f8a0d53023d9d850daa84e2058788421d46676d0fc51a17d40b41aabf
  • rpm-sign-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:e1dea4fbd9438de4f29f4916c31b42b268e19aad1cafb5ab5cef1238ff2cf8ed
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.