Description
If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-11324 | If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root. |
References
History
No history.
Status: PUBLISHED
Assigner: microfocus
Published:
Updated: 2024-09-16T20:43:12.181Z
Reserved: 2018-11-28T00:00:00.000Z
Link: CVE-2018-19639
No data.
Status : Modified
Published: 2019-03-05T16:29:00.417
Modified: 2024-11-21T03:58:20.070
Link: CVE-2018-19639
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD