CVE-2018-19639
Summary
| CVE | CVE-2018-19639 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-03-05 16:29:00 UTC |
| Updated | 2023-11-07 02:55:00 UTC |
| Description | If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Opensuse | Supportutils | All | All | All | All |
| Application | Opensuse | Supportutils | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [security-announce] openSUSE-SU-2019:1351-1: important: Security update | lists.opensuse.org | ||
| Bug 1118462 – VUL-0: CVE-2018-19639: supportutils: Code execution if run with -v | bugzilla.suse.com | ||
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Johannes Segitz of SUSE
There are currently no legacy QID mappings associated with this CVE.