Bug 1563993 (CVE-2018-1103)
Summary: | CVE-2018-1103 source-to-image: Unsanitized paths in tar.go:ExtractTarStreamFromTarReader() allow malicious containers to overwrite files on the client machine | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abhgupta, ahardin, bleanhar, ccoleman, dbaker, dedgar, hhorak, jchaloup, jgoulding, jokerman, mchappel, mfojtik, pkubat, security-response-team, sthangav, thrcka, trankin |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | source-to-image 1.1.10 | Doc Type: | If docs needed, set a value |
Doc Text: |
An improper validation of user input flaw was found in the source-to-image component of Openshift. An attacker who could trick a user into using the command to copy files locally, from a pod, could override files outside of the target directory of the command.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-21 19:58:56 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1577289, 1577290, 1577291, 1590175 | ||
Bug Blocks: | 1569669 |
Description
Sam Fowler
2018-04-05 06:47:43 UTC
Acknowledgments: Name: Michael Hanselmann (Independent) Created source-to-image tracking bugs for this issue: Affects: fedora-all [bug 1590175] |