[CLSA-2026:1777539108] rpm: Fix of CVE-2021-3521
Type:
security
Severity:
Moderate
Release date:
2026-04-30 08:51:52 UTC
Description:
- CVE-2021-3521: validate and require subkey binding signatures on PGP public keys
Updated packages:
  • rpm-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:42555c8a6eea486e4b6c72ddde296353aa7d3135332cec13c19f80b1ddb79468
  • rpm-apidocs-4.11.3-48.0.3.el7_9.tuxcare.els1.noarch.rpm
    sha:c9949b5ace709f914513edc77bb596f4b8f830d677ac18c4f2aa219b4c7afe5f
  • rpm-build-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:e82ba63902bbaa75b62e684798994b3d17940f2ab849cae7caa3feb9116f5ccb
  • rpm-build-libs-4.11.3-48.0.3.el7_9.tuxcare.els1.i686.rpm
    sha:52576faca62ab2b59530649d582aeb11db2dfd188552673146e24d9e2177de71
  • rpm-build-libs-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:88e5d71fc24437f3b5e16f6fc90f5d609c7d72e294c89e07cb2159f00324656c
  • rpm-cron-4.11.3-48.0.3.el7_9.tuxcare.els1.noarch.rpm
    sha:b5b3f08ae66d4eec9bf8a2aeb3969af86efceaa1db2d7c6b8674fa7fdab9bc5d
  • rpm-devel-4.11.3-48.0.3.el7_9.tuxcare.els1.i686.rpm
    sha:1e05e00437a0bb76b2c7672f5c525af91551ef4a7b848237ef53b7c5890d43df
  • rpm-devel-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:4a3300b4df4b034b1c6570a21792537cc6be86aec75ec9ecefd9305689d3417d
  • rpm-libs-4.11.3-48.0.3.el7_9.tuxcare.els1.i686.rpm
    sha:ceab0cc4c2178f7ebf8791c68e36f7b28d7166be7251d97600eb8207773d3968
  • rpm-libs-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:1695c512413df8b454188538a1da544120c5c3a0477e6d3ba736c7282d7ff092
  • rpm-plugin-systemd-inhibit-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:a822ba61e5bdf7b8c10f209fc2204431c436698beb448116659861e5a042e05c
  • rpm-python-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:63f76ede2af964ced973238d00a91f95540027c8ed85d672679fe75316fa0512
  • rpm-sign-4.11.3-48.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:e47914741f73266d65f130ed3a8ab4f98a350fba6c1786c94d956e1a30fb46e3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.