First published: Thu Aug 14 2003(Updated: )
up2date 3.0.7 and 3.1.23 does not properly verify RPM GPG signatures, which could allow remote attackers to cause unsigned packages to be installed from the Red Hat Network, if that network is compromised.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Up2date | =3.0.7-1 | |
Redhat Up2date | =3.1.23-1 | |
Redhat Up2date | =3.0.7-1 | |
Redhat Up2date | =3.1.23-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.