First published: Thu Jan 30 2014(Updated: )
Grant Murphy of the Red Hat Product Security team reports: there are a number of yum repositories that are configured with gpgcheck=0 but have rpms that are signed (e.g. Jenkins). External reference: <a href="https://bugs.launchpad.net/heat-templates/+bug/1267635">https://bugs.launchpad.net/heat-templates/+bug/1267635</a> <a href="https://github.com/openstack/heat-templates/">https://github.com/openstack/heat-templates/</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenStack for IBM Power | =4.0 | |
=4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0042 is classified as a moderate severity vulnerability due to the risks it poses in repository configurations.
To fix CVE-2014-0042, change the yum repository configuration to set gpgcheck=1 for signed RPMs.
CVE-2014-0042 affects Red Hat OpenStack version 4.0 and other systems using improperly configured yum repositories.
The implications of CVE-2014-0042 may include the installation of malicious RPMs if proper checks are not in place.
Yes, a patch is available in recent updates for Red Hat OpenStack to address CVE-2014-0042.