Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
advisories.mageia.org/MGASA-2014-0529.html
kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
rhn.redhat.com/errata/RHSA-2014-1974.html
rhn.redhat.com/errata/RHSA-2014-1975.html
rhn.redhat.com/errata/RHSA-2014-1976.html
www.debian.org/security/2015/dsa-3129
www.mandriva.com/security/advisories?name=MDVSA-2014:251
www.mandriva.com/security/advisories?name=MDVSA-2015:056
www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
www.securityfocus.com/bid/71558
bugzilla.redhat.com/show_bug.cgi?id=1039811
security.gentoo.org/glsa/201811-22
securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/