Lucene search

K

6 matches found

CVE
CVE
added 2019/03/05 4:29 p.m.131 views

CVE-2018-19638

In supportutils, before version 3.1-5.7.1 and if pacemaker is installed on the system, an unprivileged user could have overwritten arbitrary files in the directory that is used by supportutils to collect the log files.

4.7CVSS5.2AI score0.00042EPSS
CVE
CVE
added 2019/03/05 4:29 p.m.125 views

CVE-2018-19637

Supportutils, before version 3.1-5.7.1, wrote data to static file /tmp/supp_log, allowing local attackers to overwrite files on systems without symlink protection

5.5CVSS5.2AI score0.0004EPSS
CVE
CVE
added 2019/03/05 4:29 p.m.125 views

CVE-2018-19640

If the attacker manages to create files in the directory used to collect log files in supportutils before version 3.1-5.7.1 (e.g. with CVE-2018-19638) he can kill arbitrary processes on the local machine.

5.5CVSS5.1AI score0.00054EPSS
CVE
CVE
added 2019/03/05 4:29 p.m.121 views

CVE-2018-19639

If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root.

7.8CVSS5.7AI score0.00185EPSS
CVE
CVE
added 2019/03/05 4:29 p.m.119 views

CVE-2018-19636

Supportutils, before version 3.1-5.7.1, when run with command line argument -A searched the file system for a ndspath binary. If an attacker provides one at an arbitrary location it is executed with root privileges

7.8CVSS7.4AI score0.0004EPSS
CVE
CVE
added 2023/02/15 10:15 a.m.52 views

CVE-2022-45154

A Cleartext Storage of Sensitive Information vulnerability in suppportutils of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 15 SP3 allows attackers that get access to the support logs to gain knowledge of the stored credentials This issue affects: S...

5.5CVSS5AI score0.00009EPSS