Debian Package Tracker
Register | Log in
Subscribe

rpm

package manager for RPM

Choose email to subscribe with

general
  • source: rpm (main)
  • version: 4.17.0+dfsg1-4
  • maintainer: RPM packaging team (DMD)
  • uploaders: Michal Čihař [DMD]
  • arch: all any
  • std-ver: 4.6.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 4.12.0.2+dfsg1-2
  • oldstable: 4.14.2.1+dfsg1-1
  • stable: 4.16.1.2+dfsg1-3
  • testing: 4.17.0+dfsg1-4
  • unstable: 4.17.0+dfsg1-4
versioned links
  • 4.12.0.2+dfsg1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.14.2.1+dfsg1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.16.1.2+dfsg1-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.17.0+dfsg1-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • librpm-dev
  • librpm9
  • librpmbuild9
  • librpmio9
  • librpmsign9
  • python3-rpm
  • rpm (2 bugs: 0, 2, 0, 0)
  • rpm-common (1 bugs: 0, 1, 0, 0)
  • rpm-i18n
  • rpm2cpio
action needed
4 security issues in sid high

There are 4 open security issues in sid.

4 important issues:
  • CVE-2021-3521:
  • CVE-2021-35937:
  • CVE-2021-35938:
  • CVE-2021-35939:
Created: 2021-06-30 Last update: 2021-12-05 06:30
4 security issues in bookworm high

There are 4 open security issues in bookworm.

4 important issues:
  • CVE-2021-3521:
  • CVE-2021-35937:
  • CVE-2021-35938:
  • CVE-2021-35939:
Created: 2021-08-15 Last update: 2021-12-05 06:30
Multiarch hinter reports 2 issue(s) normal
There are issues with the multiarch metadata for this package.
  • rpm-i18n could be marked Multi-Arch: foreign
  • librpmio9 could be marked Multi-Arch: same
Created: 2016-09-14 Last update: 2022-05-28 15:37
Depends on packages which need a new maintainer normal
The packages that rpm depends on which need a new maintainer are:
  • popt (#995268)
    • Depends: libpopt-dev libpopt0 libpopt0 libpopt0 libpopt0 libpopt0 libpopt0
    • Build-Depends: libpopt-dev
  • alien (#791522)
    • Suggests: alien
Created: 2019-11-22 Last update: 2022-05-28 15:35
lintian reports 3 warnings normal
Lintian reports 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2021-09-06 Last update: 2022-01-01 04:34
RFA: The maintainer wants to pass over package maintainance. normal
The current maintainer is looking for someone who can take over maintenance of this package. If you are interested in this package, please consider taking it over. Alternatively you may want to be co-maintainer in order to help the actual maintainer. Please see bug number #923352 for more information.
Created: 2019-02-26 Last update: 2019-02-26 21:35
7 low-priority security issues in buster low

There are 7 open security issues in buster.

4 issues left for the package maintainer to handle:
  • CVE-2021-3421: (needs triaging) A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.
  • CVE-2021-3521: (needs triaging)
  • CVE-2021-20266: (needs triaging) A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.
  • CVE-2021-20271: (needs triaging) A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.

You can find information about how to handle these issues in the security team's documentation.

3 ignored issues:
  • CVE-2021-35937:
  • CVE-2021-35938:
  • CVE-2021-35939:
Created: 2021-03-12 Last update: 2021-12-05 06:30
4 low-priority security issues in bullseye low

There are 4 open security issues in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2021-3521: (needs triaging)

You can find information about how to handle this issue in the security team's documentation.

3 ignored issues:
  • CVE-2021-35937:
  • CVE-2021-35938:
  • CVE-2021-35939:
Created: 2021-08-14 Last update: 2021-12-05 06:30
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2021-11-21 Last update: 2021-11-21 05:01
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.6.0).
Created: 2022-05-11 Last update: 2022-05-11 23:24
news
[rss feed]
  • [2021-12-04] rpm 4.17.0+dfsg1-4 MIGRATED to testing (Debian testing watch)
  • [2021-12-01] Accepted rpm 4.17.0+dfsg1-4 (source) into unstable (Peter Pentchev)
  • [2021-11-27] Accepted rpm 4.17.0+dfsg1-3 (source) into unstable (Peter Pentchev)
  • [2021-11-26] Accepted rpm 4.17.0+dfsg1-2 (source) into unstable (Peter Pentchev)
  • [2021-11-20] Accepted rpm 4.17.0+dfsg1-1 (source) into unstable (Peter Pentchev)
  • [2021-07-07] rpm 4.16.1.2+dfsg1-3 MIGRATED to testing (Debian testing watch)
  • [2021-06-30] Accepted rpm 4.16.1.2+dfsg1-3 (source) into unstable (Peter Pentchev)
  • [2021-06-29] Accepted rpm 4.16.1.2+dfsg1-2 (source) into unstable (Peter Pentchev)
  • [2021-06-29] Accepted rpm 4.16.1.2+dfsg1-1 (source) into unstable (Peter Pentchev)
  • [2021-03-09] Accepted rpm 4.16.1.2+dfsg1-0.6 (source) into unstable (Matthias Klose)
  • [2021-03-09] Accepted rpm 4.16.1.2+dfsg1-0.5 (source) into unstable (Matthias Klose)
  • [2021-02-02] rpm 4.16.1.2+dfsg1-0.4 MIGRATED to testing (Debian testing watch)
  • [2021-01-28] Accepted rpm 4.16.1.2+dfsg1-0.4 (source) into unstable (Matthias Klose)
  • [2021-01-25] rpm 4.16.1.2+dfsg1-0.3 MIGRATED to testing (Debian testing watch)
  • [2021-01-20] rpm 4.16.1.2+dfsg1-0.2 MIGRATED to testing (Debian testing watch)
  • [2021-01-19] Accepted rpm 4.16.1.2+dfsg1-0.3 (source) into unstable (Matthias Klose)
  • [2021-01-15] Accepted rpm 4.16.1.2+dfsg1-0.2 (source) into unstable (Matthias Klose)
  • [2021-01-14] Accepted rpm 4.16.1.2+dfsg1-0.1 (source amd64 all) into unstable, unstable (Debian FTP Masters) (signed by: Matthias Klose)
  • [2020-03-20] rpm 4.14.2.1+dfsg1-1.1 MIGRATED to testing (Debian testing watch)
  • [2020-03-14] Accepted rpm 4.14.2.1+dfsg1-1.1 (source) into unstable (Boyuan Yang)
  • [2019-02-27] rpm 4.14.2.1+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2019-02-17] Accepted rpm 4.14.2.1+dfsg1-1 (source) into unstable (Michal Čihař)
  • [2018-10-23] rpm 4.14.2+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2018-10-18] Accepted rpm 4.14.2+dfsg1-1 (source) into unstable (Michal Čihař)
  • [2018-07-29] rpm 4.14.1+dfsg1-4 MIGRATED to testing (Debian testing watch)
  • [2018-07-24] Accepted rpm 4.14.1+dfsg1-4 (source) into unstable (Michal Čihař)
  • [2018-06-05] rpm 4.14.1+dfsg1-3 MIGRATED to testing (Debian testing watch)
  • [2018-05-31] Accepted rpm 4.14.1+dfsg1-3 (source) into unstable (Michal Čihař)
  • [2018-03-19] rpm 4.14.1+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2018-03-14] Accepted rpm 4.14.1+dfsg1-2 (source) into unstable (Michal Čihař)
  • 1
  • 2
bugs [bug history graph]
  • all: 4
  • RC: 0
  • I&N: 4
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 3)
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 48)
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 4.17.0+dfsg1-4build1
  • 32 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing