It was discovered that rpm-ostree and rpm-ostree-client before 2017.3 fail to properly check GPG signatures on packages when doing layering. Packages with unsigned or badly signed content could fail to be rejected as expected. This issue is partially mitigated on RHEL Atomic Host, where certificate pinning is used by default.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/96558 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:0444 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2623 | Issue Tracking Third Party Advisory |
http://www.securityfocus.com/bid/96558 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:0444 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2623 | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 03:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/96558 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2017:0444 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2623 - Issue Tracking, Third Party Advisory |
Information
Published : 2018-07-27 18:29
Updated : 2024-11-21 03:23
NVD link : CVE-2017-2623
Mitre link : CVE-2017-2623
CVE.ORG link : CVE-2017-2623
JSON object : View
Products Affected
redhat
- enterprise_linux
rpm-ostree
- rpm-ostree-client
- rpm-ostree
CWE
CWE-295
Improper Certificate Validation