Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/
https://security.gentoo.org/glsa/201811-22
https://bugzilla.redhat.com/show_bug.cgi?id=1039811
http://www.securityfocus.com/bid/71558
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.mandriva.com/security/advisories?name=MDVSA-2015:056
http://www.mandriva.com/security/advisories?name=MDVSA-2014:251
http://www.debian.org/security/2015/dsa-3129
http://rhn.redhat.com/errata/RHSA-2014-1976.html
http://rhn.redhat.com/errata/RHSA-2014-1975.html
http://rhn.redhat.com/errata/RHSA-2014-1974.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705