Debian Package Tracker
Register | Log in
Subscribe

rpm

package manager for RPM

Choose email to subscribe with

general
  • source: rpm (main)
  • version: 4.18.0+dfsg-1
  • maintainer: RPM packaging team (DMD)
  • uploaders: Michal Čihař [DMD]
  • arch: all any
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 4.12.0.2+dfsg1-2
  • oldstable: 4.14.2.1+dfsg1-1
  • stable: 4.16.1.2+dfsg1-3
  • testing: 4.18.0+dfsg-1
  • unstable: 4.18.0+dfsg-1
versioned links
  • 4.12.0.2+dfsg1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.14.2.1+dfsg1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.16.1.2+dfsg1-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.18.0+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • librpm-dev
  • librpm9
  • librpmbuild9
  • librpmio9
  • librpmsign9
  • python3-rpm
  • rpm (2 bugs: 0, 2, 0, 0)
  • rpm-common (1 bugs: 0, 1, 0, 0)
  • rpm-i18n
  • rpm2cpio
action needed
A new upstream version is available: 4.18.1 high
A new upstream version 4.18.1 is available, you should consider packaging it.
Created: 2023-03-18 Last update: 2023-03-30 22:03
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2021-35937: A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Created: 2022-07-04 Last update: 2023-03-27 11:06
Multiarch hinter reports 2 issue(s) normal
There are issues with the multiarch metadata for this package.
  • rpm-i18n could be marked Multi-Arch: foreign
  • librpmio9 could be marked Multi-Arch: same
Created: 2016-09-14 Last update: 2023-03-31 00:07
Depends on packages which need a new maintainer normal
The packages that rpm depends on which need a new maintainer are:
  • alien (#791522)
    • Suggests: alien
Created: 2019-11-22 Last update: 2023-03-30 23:06
lintian reports 10 warnings normal
Lintian reports 10 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2023-01-06 Last update: 2023-02-18 08:05
RFA: The maintainer wants to pass over package maintainance. normal
The current maintainer is looking for someone who can take over maintenance of this package. If you are interested in this package, please consider taking it over. Alternatively you may want to be co-maintainer in order to help the actual maintainer. Please see bug number #923352 for more information.
Created: 2019-02-26 Last update: 2019-02-26 21:35
4 low-priority security issues in bullseye low

There are 4 open security issues in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2021-3521: (needs triaging) There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature." RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity. To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM or public key. It is strongly recommended to only use RPMs and public keys from trusted sources.

You can find information about how to handle this issue in the security team's documentation.

3 ignored issues:
  • CVE-2021-35937: A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
  • CVE-2021-35938: A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
  • CVE-2021-35939: It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Created: 2022-07-04 Last update: 2023-03-27 11:06
debian/patches: 6 patches to forward upstream low

Among the 10 debian patches available in version 4.18.0+dfsg-1 of the package, we noticed the following issues:

  • 6 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-02-27 20:59
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2022-07-23 Last update: 2022-07-23 22:00
news
[rss feed]
  • [2023-01-11] rpm 4.18.0+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2023-01-05] Accepted rpm 4.18.0+dfsg-1 (source) into unstable (Peter Pentchev)
  • [2022-09-10] rpm 4.17.1.1+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2022-09-08] Accepted rpm 4.17.1.1+dfsg-1 (source) into unstable (Peter Pentchev)
  • [2021-12-04] rpm 4.17.0+dfsg1-4 MIGRATED to testing (Debian testing watch)
  • [2021-12-01] Accepted rpm 4.17.0+dfsg1-4 (source) into unstable (Peter Pentchev)
  • [2021-11-27] Accepted rpm 4.17.0+dfsg1-3 (source) into unstable (Peter Pentchev)
  • [2021-11-26] Accepted rpm 4.17.0+dfsg1-2 (source) into unstable (Peter Pentchev)
  • [2021-11-20] Accepted rpm 4.17.0+dfsg1-1 (source) into unstable (Peter Pentchev)
  • [2021-07-07] rpm 4.16.1.2+dfsg1-3 MIGRATED to testing (Debian testing watch)
  • [2021-06-30] Accepted rpm 4.16.1.2+dfsg1-3 (source) into unstable (Peter Pentchev)
  • [2021-06-29] Accepted rpm 4.16.1.2+dfsg1-2 (source) into unstable (Peter Pentchev)
  • [2021-06-29] Accepted rpm 4.16.1.2+dfsg1-1 (source) into unstable (Peter Pentchev)
  • [2021-03-09] Accepted rpm 4.16.1.2+dfsg1-0.6 (source) into unstable (Matthias Klose)
  • [2021-03-09] Accepted rpm 4.16.1.2+dfsg1-0.5 (source) into unstable (Matthias Klose)
  • [2021-02-02] rpm 4.16.1.2+dfsg1-0.4 MIGRATED to testing (Debian testing watch)
  • [2021-01-28] Accepted rpm 4.16.1.2+dfsg1-0.4 (source) into unstable (Matthias Klose)
  • [2021-01-25] rpm 4.16.1.2+dfsg1-0.3 MIGRATED to testing (Debian testing watch)
  • [2021-01-20] rpm 4.16.1.2+dfsg1-0.2 MIGRATED to testing (Debian testing watch)
  • [2021-01-19] Accepted rpm 4.16.1.2+dfsg1-0.3 (source) into unstable (Matthias Klose)
  • [2021-01-15] Accepted rpm 4.16.1.2+dfsg1-0.2 (source) into unstable (Matthias Klose)
  • [2021-01-14] Accepted rpm 4.16.1.2+dfsg1-0.1 (source amd64 all) into unstable, unstable (Debian FTP Masters) (signed by: Matthias Klose)
  • [2020-03-20] rpm 4.14.2.1+dfsg1-1.1 MIGRATED to testing (Debian testing watch)
  • [2020-03-14] Accepted rpm 4.14.2.1+dfsg1-1.1 (source) into unstable (Boyuan Yang)
  • [2019-02-27] rpm 4.14.2.1+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2019-02-17] Accepted rpm 4.14.2.1+dfsg1-1 (source) into unstable (Michal Čihař)
  • [2018-10-23] rpm 4.14.2+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2018-10-18] Accepted rpm 4.14.2+dfsg1-1 (source) into unstable (Michal Čihař)
  • [2018-07-29] rpm 4.14.1+dfsg1-4 MIGRATED to testing (Debian testing watch)
  • [2018-07-24] Accepted rpm 4.14.1+dfsg1-4 (source) into unstable (Michal Čihař)
  • 1
  • 2
bugs [bug history graph]
  • all: 4
  • RC: 0
  • I&N: 4
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 10)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 46)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 4.18.0+dfsg-1build1
  • 33 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing