Public Date:
1600221: CVE-2018-10897 yum-utils: reposync: improper path validation may lead to directory traversal
A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to sanitize paths in remote repository configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. If reposync is running with heightened privileges on a targeted system, this flaw could potentially result in system compromise via the overwriting of critical system files.

Find out more about CVE-2018-10897 from the MITRE CVE dictionary dictionary and NIST NVD.


Red Hat Enterprise Virtualization includes reposync as a component from the base Enterprise Linux system. It is not used by virtualization or management components, and it is not generally useful to mirror untrusted repositories to either Hypervisor or Management Appliance. For Red Hat Enterprise Virtualization, this issue affects only unlikely configurations and thus is rated as Moderate.

CVSS v3 metrics

CVSS3 Base Score 8.8
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (yum-utils) RHSA-2018:2285 2018-07-30
Red Hat Enterprise Linux 6 (yum-utils) RHSA-2018:2284 2018-07-30
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts RHSA-2018:2626 2018-09-04

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 8 dnf-plugins-core Not affected
Red Hat Enterprise Linux 5 yum-utils Will not fix
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.


Red Hat would like to thank Jay Grizzard (Clover Network) and Aaron Levy (Clover Network) for reporting this issue.
Last Modified