vulnerability
CentOS Linux: CVE-2018-10897: Important: yum-utils security update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Jul 30, 2018 | Aug 11, 2018 | May 25, 2023 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Jul 30, 2018
Added
Aug 11, 2018
Modified
May 25, 2023
Description
A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to sanitize paths in remote repository configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. If reposync is running with heightened privileges on a targeted system, this flaw could potentially result in system compromise via the overwriting of critical system files. Version 1.1.31 and older are believed to be affected.
Solution(s)
centos-upgrade-yum-networkmanager-dispatchercentos-upgrade-yum-plugin-aliasescentos-upgrade-yum-plugin-auto-update-debug-infocentos-upgrade-yum-plugin-changelogcentos-upgrade-yum-plugin-coprcentos-upgrade-yum-plugin-fastestmirrorcentos-upgrade-yum-plugin-filter-datacentos-upgrade-yum-plugin-fs-snapshotcentos-upgrade-yum-plugin-keyscentos-upgrade-yum-plugin-list-datacentos-upgrade-yum-plugin-localcentos-upgrade-yum-plugin-merge-confcentos-upgrade-yum-plugin-ovlcentos-upgrade-yum-plugin-post-transaction-actionscentos-upgrade-yum-plugin-pre-transaction-actionscentos-upgrade-yum-plugin-prioritiescentos-upgrade-yum-plugin-protectbasecentos-upgrade-yum-plugin-pscentos-upgrade-yum-plugin-remove-with-leavescentos-upgrade-yum-plugin-rpm-warm-cachecentos-upgrade-yum-plugin-securitycentos-upgrade-yum-plugin-show-leavescentos-upgrade-yum-plugin-tmprepocentos-upgrade-yum-plugin-tsflagscentos-upgrade-yum-plugin-upgrade-helpercentos-upgrade-yum-plugin-verifycentos-upgrade-yum-plugin-versionlockcentos-upgrade-yum-updateonbootcentos-upgrade-yum-utils

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.