Description
It was discovered that rpm-ostree and rpm-ostree-client before 2017.3 fail to properly check GPG signatures on packages when doing layering. Packages with unsigned or badly signed content could fail to be rejected as expected. This issue is partially mitigated on RHEL Atomic Host, where certificate pinning is used by default.
Published: 2018-07-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2017-11784 It was discovered that rpm-ostree and rpm-ostree-client before 2017.3 fail to properly check GPG signatures on packages when doing layering. Packages with unsigned or badly signed content could fail to be rejected as expected. This issue is partially mitigated on RHEL Atomic Host, where certificate pinning is used by default.
History

No history.

Subscriptions

Redhat Enterprise Linux Rhel Atomic
Rpm-ostree Rpm-ostree Rpm-ostree-client
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T14:02:07.178Z

Reserved: 2016-12-01T00:00:00.000Z

Link: CVE-2017-2623

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-27T18:29:00.767

Modified: 2024-11-21T03:23:51.270

Link: CVE-2017-2623

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-03-02T00:00:00Z

Links: CVE-2017-2623 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses