Lucene search

K
amazonAmazonALAS2-2018-1063
HistoryAug 21, 2018 - 5:18 p.m.

Important: yum-utils

2018-08-2117:18:00
alas.aws.amazon.com
10

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.0%

Issue Overview:

A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to sanitize paths in remote repository configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. If reposync is running with heightened privileges on a targeted system, this flaw could potentially result in system compromise via the overwriting of critical system files. (CVE-2018-10897)

Affected Packages:

yum-utils

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update yum-utils to update your system.

New Packages:

noarch:  
    yum-utils-1.1.31-46.amzn2.0.1.noarch  
    yum-updateonboot-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-changelog-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-fastestmirror-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-protectbase-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-versionlock-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-tsflags-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-priorities-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-merge-conf-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-upgrade-helper-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-aliases-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-list-data-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-filter-data-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-tmprepo-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-verify-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-keys-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-remove-with-leaves-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-pre-transaction-actions-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-post-transaction-actions-1.1.31-46.amzn2.0.1.noarch  
    yum-NetworkManager-dispatcher-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-rpm-warm-cache-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-auto-update-debug-info-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-show-leaves-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-local-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-fs-snapshot-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-ps-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-copr-1.1.31-46.amzn2.0.1.noarch  
    yum-plugin-ovl-1.1.31-46.amzn2.0.1.noarch  
  
src:  
    yum-utils-1.1.31-46.amzn2.0.1.src  

Additional References

Red Hat: CVE-2018-10897

Mitre: CVE-2018-10897

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.0%