The installUpdates function in yum-cron/yum-cron.py in yum 3.4.3 and earlier does not properly check the return value of the sigCheckPkg function, which allows remote attackers to bypass the RMP package signing restriction via an unsigned package.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/65119 | vdb entry |
http://yum.baseurl.org/gitweb?p=yum.git%3Ba=commitdiff%3Bh=9df69e5794 | |
http://secunia.com/advisories/56637 | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1052440 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1057377 |