8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.007 Low
EPSS
Percentile
80.0%
Issue Overview:
A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to sanitize paths in remote repository configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. If reposync is running with heightened privileges on a targeted system, this flaw could potentially result in system compromise via the overwriting of critical system files. (CVE-2018-10897)
Affected Packages:
yum-utils
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update yum-utils to update your system.
New Packages:
noarch:
yum-utils-1.1.31-46.amzn2.0.1.noarch
yum-updateonboot-1.1.31-46.amzn2.0.1.noarch
yum-plugin-changelog-1.1.31-46.amzn2.0.1.noarch
yum-plugin-fastestmirror-1.1.31-46.amzn2.0.1.noarch
yum-plugin-protectbase-1.1.31-46.amzn2.0.1.noarch
yum-plugin-versionlock-1.1.31-46.amzn2.0.1.noarch
yum-plugin-tsflags-1.1.31-46.amzn2.0.1.noarch
yum-plugin-priorities-1.1.31-46.amzn2.0.1.noarch
yum-plugin-merge-conf-1.1.31-46.amzn2.0.1.noarch
yum-plugin-upgrade-helper-1.1.31-46.amzn2.0.1.noarch
yum-plugin-aliases-1.1.31-46.amzn2.0.1.noarch
yum-plugin-list-data-1.1.31-46.amzn2.0.1.noarch
yum-plugin-filter-data-1.1.31-46.amzn2.0.1.noarch
yum-plugin-tmprepo-1.1.31-46.amzn2.0.1.noarch
yum-plugin-verify-1.1.31-46.amzn2.0.1.noarch
yum-plugin-keys-1.1.31-46.amzn2.0.1.noarch
yum-plugin-remove-with-leaves-1.1.31-46.amzn2.0.1.noarch
yum-plugin-pre-transaction-actions-1.1.31-46.amzn2.0.1.noarch
yum-plugin-post-transaction-actions-1.1.31-46.amzn2.0.1.noarch
yum-NetworkManager-dispatcher-1.1.31-46.amzn2.0.1.noarch
yum-plugin-rpm-warm-cache-1.1.31-46.amzn2.0.1.noarch
yum-plugin-auto-update-debug-info-1.1.31-46.amzn2.0.1.noarch
yum-plugin-show-leaves-1.1.31-46.amzn2.0.1.noarch
yum-plugin-local-1.1.31-46.amzn2.0.1.noarch
yum-plugin-fs-snapshot-1.1.31-46.amzn2.0.1.noarch
yum-plugin-ps-1.1.31-46.amzn2.0.1.noarch
yum-plugin-copr-1.1.31-46.amzn2.0.1.noarch
yum-plugin-ovl-1.1.31-46.amzn2.0.1.noarch
src:
yum-utils-1.1.31-46.amzn2.0.1.src
Red Hat: CVE-2018-10897
Mitre: CVE-2018-10897
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.007 Low
EPSS
Percentile
80.0%