Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "debugedit" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "librpm-dbg" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "librpm-dev" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "librpm3" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "librpmbuild3" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "librpmio3" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "librpmsign1" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "python-rpm" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "rpm" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "rpm-common" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "rpm-i18n" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "rpm2cpio" } ] }