First published: Wed Jul 11 2018(Updated: )
A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to sanitize paths in remote repository configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. If reposync is running with heightened privileges on a targeted system, this flaw could potentially result in system compromise via the overwriting of critical system files. Version 1.1.31 and older are believed to be affected.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rpm Yum-utils | <=1.1.31 | |
Redhat Virtualization | =4.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 |
https://github.com/rpm-software-management/yum-utils/commit/6a8de061f8fdc885e74ebe8c94625bf53643b71c
https://github.com/rpm-software-management/yum-utils/commit/7554c0133eb830a71dc01846037cc047d0acbc2c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-10897.
The severity of CVE-2018-10897 is critical.
The affected software for CVE-2018-10897 includes Rpm Yum-utils, Redhat Virtualization, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, and Redhat Enterprise Linux Workstation.
CVE-2018-10897 allows attackers who control a repository to copy files outside of the destination directory on the targeted system via path traversal.
Yes, the references for CVE-2018-10897 are: [1] https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1600454 [2] https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1552328 [3] https://github.com/rpm-software-management/yum-utils/commit/7554c0133eb830a71dc01846037cc047d0acbc2c