Gentoo Logo

RPM: Buffer overflow


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200611-08 / rpm
Release Date November 13, 2006
Latest Revision November 13, 2006: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
app-arch/rpm < 4.4.6-r3 >= 4.4.6-r3 All supported architectures

Related bugreports: #154218


RPM is vulnerable to a buffer overflow and possibly the execution of arbitrary code when opening specially crafted packages.

2.  Impact Information


The Red Hat Package Manager (RPM) is a command line driven package management system capable of installing, uninstalling, verifying, querying, and updating computer software packages.


Vladimir Mosgalin has reported that when processing certain packages, RPM incorrectly allocates memory for the packages, possibly causing a heap-based buffer overflow.


An attacker could entice a user to open a specially crafted RPM package and execute code with the privileges of that user if certain locales are set.

3.  Resolution Information


There is no known workaround at this time.


All RPM users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/rpm-4.4.6-r3"

4.  References


Page updated November 13, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.