First published: Wed Aug 05 2020(Updated: )
A flaw was found in librepo in versions before 1.12.1. A directory traversal vulnerability was found where it failed to sanitize paths in remote repository metadata. An attacker controlling a remote repository may be able to copy files outside of the destination directory on the targeted system via path traversal. This flaw could potentially result in system compromise via the overwriting of critical system files. The highest threat from this flaw is to users that make use of untrusted third-party repositories.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/librepo | <1.12.1 | 1.12.1 |
Redhat Librepo | <1.12.1 | |
openSUSE Backports SLE | =15.0-sp2 | |
openSUSE Leap | =15.2 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14352 is a directory traversal vulnerability found in librepo before version 1.12.1.
CVE-2020-14352 affects the librepo package before version 1.12.1.
CVE-2020-14352 has a severity level of high, with a severity value of 8.
To fix CVE-2020-14352, update the librepo package to version 1.12.1 or later.
You can find more information about CVE-2020-14352 in the references: http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00072.html, http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00055.html, https://bugzilla.redhat.com/show_bug.cgi?id=1866498