RPM CVE-2012-6088 Signature Verification Security Bypass Vulnerability

RPM is prone to a security-bypass vulnerability.

An attacker may exploit this issue to bypass signature verification and cause the application to accept unsigned packages. Successful attacks may allow the attacker to execute arbitrary code on a vulnerable computer.


 

Privacy Statement
Copyright 2010, SecurityFocus