Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.3162 librepo security update 16 September 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: librepo Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 8 Red Hat Enterprise Linux WS/Desktop 8 Impact/Access: Increased Privileges -- Remote with User Interaction Modify Arbitrary Files -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2020-14352 Reference: ESB-2020.3156 Original Bulletin: https://access.redhat.com/errata/RHSA-2020:3749 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: librepo security update Advisory ID: RHSA-2020:3749-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:3749 Issue date: 2020-09-15 CVE Names: CVE-2020-14352 ===================================================================== 1. Summary: An update for librepo is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux BaseOS EUS (v. 8.1) - aarch64, ppc64le, s390x, x86_64 3. Description: The librepo library provides a C and Python API to download repository metadata. Security Fix(es): * librepo: missing path validation in repomd.xml may lead to directory traversal (CVE-2020-14352) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1866498 - CVE-2020-14352 librepo: missing path validation in repomd.xml may lead to directory traversal 6. Package List: Red Hat Enterprise Linux BaseOS EUS (v. 8.1): Source: librepo-1.10.3-4.el8_1.src.rpm aarch64: librepo-1.10.3-4.el8_1.aarch64.rpm librepo-debuginfo-1.10.3-4.el8_1.aarch64.rpm librepo-debugsource-1.10.3-4.el8_1.aarch64.rpm python3-librepo-1.10.3-4.el8_1.aarch64.rpm python3-librepo-debuginfo-1.10.3-4.el8_1.aarch64.rpm ppc64le: librepo-1.10.3-4.el8_1.ppc64le.rpm librepo-debuginfo-1.10.3-4.el8_1.ppc64le.rpm librepo-debugsource-1.10.3-4.el8_1.ppc64le.rpm python3-librepo-1.10.3-4.el8_1.ppc64le.rpm python3-librepo-debuginfo-1.10.3-4.el8_1.ppc64le.rpm s390x: librepo-1.10.3-4.el8_1.s390x.rpm librepo-debuginfo-1.10.3-4.el8_1.s390x.rpm librepo-debugsource-1.10.3-4.el8_1.s390x.rpm python3-librepo-1.10.3-4.el8_1.s390x.rpm python3-librepo-debuginfo-1.10.3-4.el8_1.s390x.rpm x86_64: librepo-1.10.3-4.el8_1.i686.rpm librepo-1.10.3-4.el8_1.x86_64.rpm librepo-debuginfo-1.10.3-4.el8_1.i686.rpm librepo-debuginfo-1.10.3-4.el8_1.x86_64.rpm librepo-debugsource-1.10.3-4.el8_1.i686.rpm librepo-debugsource-1.10.3-4.el8_1.x86_64.rpm python3-librepo-1.10.3-4.el8_1.x86_64.rpm python3-librepo-debuginfo-1.10.3-4.el8_1.i686.rpm python3-librepo-debuginfo-1.10.3-4.el8_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-14352 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX2CWUtzjgjWX9erEAQjASg/+O3GvWs07rha6ufCb4FN0ERXzOWqIz9A7 R0Q3nHsKI45fXNSYxqKI4XOQPfHRBGc15bafo44mlX+kN+4VBQKEgN19XHTORv9s 1M5lCtR5boZpH8nQ44GreNGQWLYDOnRH8Pj/J9cXRNP/576mkGtN+kxjg4WQ7iVM lrvokqExIJ4pRLaCkFRA/fxGAS2zTbpIo2akWlcDxD5EgGo72xLMsgPwXpoh2Rlw 316qji9g0FDArZlUYPaYOLrde64g2xzjAh3eTWVymLIW9BheZlMOcsUoHqCIu2xn 9Auu5jMCBBGUjU0Ldt2HkRErUiyqUoKjm4bDOOaU9fiscl9NbSsuY0qA2MIbaZu5 gxqHnti0dF4RsHavtUw/TSlRN39piqYbosQ5sIsb7/4oF9iP9lg3TJhluBH88Muq ep2GzXUklXW/rH6GCs9MYkjgVbp1kkWGG2Ko2KnXsfzzi9YQVv2Jjq/nMONa73WI 5m5Xe0gWIpBFPzUisQZ/3wEG9HVKBUl8/rp57+pkiAigpazjMQ3eGvvERi7t7LIq We8FeE1uPRyJuwRx06LtyMt6mQ77qnSBQsu+hvObWXhW14qf6/WxnKjpzomh3j/4 1g/MQDb+0MI2yAfBdVOdU9Ju1w/oYHO3Vm2mWsw4XwalffxGsXiiEg3OXx26xibe iqMVf2fQnns= =wR2S - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBX2E79+NLKJtyKPYoAQjnfA/7Bfmo9UGXax1R2B34opz3e0KVUrTobtex lbQH9OevFv1Id1lOJuUzl482H0y40oDu28joK9zD/csT1xmHnD8O+19vjEakYrVT iEbBmIQEqoeW9S0O40Xg8yHglk6CVfMO6AtCuo0cRmHIQ5XQEZlOC5frcSJ8+uAa L5GnQpiB0Ta33SbZdg43XnJzPxa9Ss2ik2GNR2rqv5VPxD/v75d+CMGFEAxCX656 g/C6H72kxh1QhkqhroBgygI4a8191VemFhaGGoyuG+Ll7FTED72/S+aj1z1UPd01 UwJxlMlzxpkZmzfrXkdO/hlLs0tdJyjnSAHXU9uPukJb6qeQIviRJLrRWMfsz0vY XXXo5/dnwDNZi2rFmDER2k9TgPAAZ7jQfhB4wRZu2cxnroaHEN+zFKVN4RHlTm2E ysZv1W4E5EiUsZMhyzzmdDS3C4SzbVL5sWKVt3JlppW1+tIsr5SDPCH3feUHdqqY RsebeljPr4QuQ+WNWbyyFPcawRnOMzXjqsrmFuWg3AcfQF1/xD3SS8gXadrtD+n1 uKQHQ9O6bAQxm2DK6/mBzWuQQGs3NBU/5Mie6kM4Ecqas2QcOLTzKPMSXUC7DJwm t1nRBEnB319uvgFOKB/9bg2h9a17U6tdbYNg9eIy85Qk07Bl0gkdcjAz91vKV0Ox Y1cgJC5M2+0= =XXzU -----END PGP SIGNATURE-----