Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-12476 (GCVE-0-2018-12476)
Vulnerability from cvelistv5
Published
2020-01-27 08:30
Modified
2024-09-16 20:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-23 - Relative Path Traversal
Summary
Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | SUSE | SUSE Linux Enterprise Server 15 |
Version: obs-service-tar_scm < 0.9.2.1537788075.fefaa74: |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:38:06.188Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107944" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SUSE Linux Enterprise Server 15", "vendor": "SUSE", "versions": [ { "lessThan": "0.9.2.1537788075.fefaa74:", "status": "affected", "version": "obs-service-tar_scm", "versionType": "custom" } ] }, { "product": "Factory", "vendor": "openSUSE", "versions": [ { "lessThan": "0.9.2.1537788075.fefaa74", "status": "affected", "version": "obs-service-tar_scm", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Matthias Gerstner of SUSE" } ], "datePublic": "2020-01-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23: Relative Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:38", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107944" } ], "source": { "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1107944", "defect": [ "1107944" ], "discovery": "INTERNAL" }, "title": "obs-service-extract_file\u0027s outfilename parameter allows to write files outside of package directory", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2020-01-27T00:00:00.000Z", "ID": "CVE-2018-12476", "STATE": "PUBLIC", "TITLE": "obs-service-extract_file\u0027s outfilename parameter allows to write files outside of package directory" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SUSE Linux Enterprise Server 15", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "obs-service-tar_scm", "version_value": "0.9.2.1537788075.fefaa74:" } ] } } ] }, "vendor_name": "SUSE" }, { "product": { "product_data": [ { "product_name": "Factory", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "obs-service-tar_scm", "version_value": "0.9.2.1537788075.fefaa74" } ] } } ] }, "vendor_name": "openSUSE" } ] } }, "credit": [ { "lang": "eng", "value": "Matthias Gerstner of SUSE" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-23: Relative Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1107944", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107944" } ] }, "source": { "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1107944", "defect": [ "1107944" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2018-12476", "datePublished": "2020-01-27T08:30:14.943188Z", "dateReserved": "2018-06-15T00:00:00", "dateUpdated": "2024-09-16T20:52:13.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-12476\",\"sourceIdentifier\":\"security@opentext.com\",\"published\":\"2020-01-27T09:15:11.100\",\"lastModified\":\"2024-11-21T03:45:17.570\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de Salto de Ruta Relativa en obs-service-tar_scm de SUSE Linux Enterprise Server versi\u00f3n 15; openSUSE Factory, permite a atacantes remotos con control sobre un repositorio sobrescribir archivos en la m\u00e1quina del usuario local si un servicio malicioso es ejecutado. Este problema afecta a: obs-service-tar_scm versiones anteriores a 0.9.2.1537788075.fefaa74 de SUSE Linux Enterprise Server versi\u00f3n 15. obs-service-tar_scm versiones anteriores a 0.9.2.1537788075.fefaa74 de openSUSE Factory.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@opentext.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@opentext.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-23\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:obs-service-tar_scm:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.9.2.1537788075.fefaa74\",\"matchCriteriaId\":\"E397B638-1DD2-4314-83B9-F654DE1B4619\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF73A3D9-6566-4CBF-AA5F-5A4B99719A1D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:obs-service-tar_scm:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.9.2.1537788075.fefaa74\",\"matchCriteriaId\":\"E397B638-1DD2-4314-83B9-F654DE1B4619\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:opensuse_factory:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D9A5D6-4B12-4B25-ACD2-560C864B6FE1\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1107944\",\"source\":\"security@opentext.com\"},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1107944\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
opensuse-su-2024:11107-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 on GA media
Notes
Title of the patch
obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 on GA media
Description of the patch
These are all security issues fixed in the obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11107
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11107", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11107-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12473 page", "url": "https://www.suse.com/security/cve/CVE-2018-12473/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12474 page", "url": "https://www.suse.com/security/cve/CVE-2018-12474/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12476 page", "url": "https://www.suse.com/security/cve/CVE-2018-12476/" } ], "title": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11107-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "product": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "product_id": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64" } }, { "category": "product_version", "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "product": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "product_id": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64" } }, { "category": "product_version", "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "product": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "product_id": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64" } }, { "category": "product_version", "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "product": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "product_id": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64" } }, { "category": "product_version", "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "product": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "product_id": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64" } }, { "category": "product_version", "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "product": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "product_id": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product_id": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le" } }, { "category": "product_version", "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product_id": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le" } }, { "category": "product_version", "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product_id": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le" } }, { "category": "product_version", "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product_id": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le" } }, { "category": "product_version", "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product_id": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le" } }, { "category": "product_version", "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product_id": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "product": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "product_id": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x" } }, { "category": "product_version", "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "product": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "product_id": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x" } }, { "category": "product_version", "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "product": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "product_id": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x" } }, { "category": "product_version", "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "product": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "product_id": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x" } }, { "category": "product_version", "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "product": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "product_id": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x" } }, { "category": "product_version", "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "product": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "product_id": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "product": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "product_id": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64" } }, { "category": "product_version", "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "product": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "product_id": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" } }, { "category": "product_version", "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "product": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "product_id": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64" } }, { "category": "product_version", "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "product": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "product_id": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64" } }, { "category": "product_version", "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "product": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "product_id": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64" } }, { "category": "product_version", "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "product": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "product_id": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64" }, "product_reference": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le" }, "product_reference": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x" }, "product_reference": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64" }, "product_reference": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64" }, "product_reference": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le" }, "product_reference": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x" }, "product_reference": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" }, "product_reference": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64" }, "product_reference": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le" }, "product_reference": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x" }, "product_reference": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64" }, "product_reference": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64" }, "product_reference": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le" }, "product_reference": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x" }, "product_reference": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64" }, "product_reference": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64" }, "product_reference": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le" }, "product_reference": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x" }, "product_reference": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64" }, "product_reference": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64" }, "product_reference": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le" }, "product_reference": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x" }, "product_reference": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" }, "product_reference": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12473", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12473" } ], "notes": [ { "category": "general", "text": "A path traversal traversal vulnerability in obs-service-tar_scm of Open Build Service allows remote attackers to cause access files not in the current build. On the server itself this is prevented by confining the worker via KVM. Affected releases are openSUSE Open Build Service: versions prior to 70d1aa4cc4d7b940180553a63805c22fc62e2cf0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12473", "url": "https://www.suse.com/security/cve/CVE-2018-12473" }, { "category": "external", "summary": "SUSE Bug 1105361 for CVE-2018-12473", "url": "https://bugzilla.suse.com/1105361" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12473" }, { "cve": "CVE-2018-12474", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12474" } ], "notes": [ { "category": "general", "text": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12474", "url": "https://www.suse.com/security/cve/CVE-2018-12474" }, { "category": "external", "summary": "SUSE Bug 1107507 for CVE-2018-12474", "url": "https://bugzilla.suse.com/1107507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-12474" }, { "cve": "CVE-2018-12476", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12476" } ], "notes": [ { "category": "general", "text": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12476", "url": "https://www.suse.com/security/cve/CVE-2018-12476" }, { "category": "external", "summary": "SUSE Bug 1107944 for CVE-2018-12476", "url": "https://bugzilla.suse.com/1107944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12476" } ] }
opensuse-su-2019:0326-1
Vulnerability from csaf_opensuse
Published
2019-03-23 11:14
Modified
2019-03-23 11:14
Summary
Security update for obs-service-tar_scm
Notes
Title of the patch
Security update for obs-service-tar_scm
Description of the patch
This update for obs-service-tar_scm fixes the following issues:
Security vulnerabilities addressed:
- CVE-2018-12473: Fixed a path traversal issue, which allowed users to access
files outside of the repository using relative paths (bsc#1105361)
- CVE-2018-12474: Fixed an issue whereby crafted service parameters allowed for
unexpected behaviour (bsc#1107507)
- CVE-2018-12476: Fixed an issue whereby the outfilename parameter allowed to
write files outside of package directory (bsc#1107944)
Other bug fixes and changes made:
- Prefer UTF-8 locale as output format for changes
- added KankuFile
- fix problems with unicode source files
- added python-six to Requires in specfile
- better encoding handling
- fixes bsc#1082696 and bsc#1076410
- fix unicode in containers
- move to python3
- added logging for better debugging changesgenerate
- raise exception if no changesauthor given
- Stop using @opensuse.org addresses to indicate a missing address
- move argparse dep to -common package
- allow submodule and ssl options in appimage
- sync spec file as used in openSUSE:Tools project
- check encoding problems for svn and print proper error msg
- added new param '--locale'
- separate service file installation in GNUmakefile
- added glibc as Recommends in spec file
- cleanup for broken svn caches
- another fix for unicode problem in obs_scm
- Final fix for unicode in filenames
- Another attempt to fix unicode filenames in prep_tree_for_archive
- Another attempt to fix unicode filenames in prep_tree_for_archive
- fix bug with unicode filenames in prep_tree_for_archive
- reuse _service*_servicedata/changes files from previous service runs
- fix problems with unicode characters in commit messages for changeloggenerate
- fix encoding issues if commit message contains utf8 char
- revert encoding for old changes file
- remove hardcoded utf-8 encodings
- Add support for extract globbing
- split pylint2 in GNUmakefile
- fix check for '--reproducible'
- create reproducible obscpio archives
- fix regression from 44b3bee
- Support also SSH urls for Git
- check name/version option in obsinfo for slashes
- check url for remote url
- check symlinks in subdir parameter
- check filename for slashes
- disable follow_symlinks in extract feature
- switch to obs_scm for this package
- run download_files in appimage and snapcraft case
- check --extract file path for parent dir
- Fix parameter descriptions
- changed os.removedirs -> shutil.rmtree
- Adding information regarding the *package-metadata* option for the *tar* service The tar service is highly useful in combination with the *obscpio* service. After the fix for the metadata for the latter one, it is important to inform the users of the *tar* service that metadata is kept only if the flag *package-metadata* is enabled. Add the flag to the .service file for mentioning that.
- Allow metadata packing for CPIO archives when desired As of now, metadata are always excluded from *obscpio* packages. This is because the *package-metadata* flag is ignored; this change (should) make *obscpio* aware of it.
- improve handling of corrupt git cache directories
- only do git stash save/pop if we have a non-empty working tree (#228)
- don't allow DEBUG_TAR_SCM to change behaviour (#240)
- add stub user docs in lieu of something proper (#238)
- Remove clone_dir if clone fails
- python-unittest2 is only required for the optional make check
- move python-unittest2 dep to test suite only part (submission by olh)
- Removing redundant pass statement
- missing import for logging functions.
- [backend] Adding http proxy support
- python-unittest2 is only required for the optional make check
- make installation of scm's optional
- add a lot more detail to README
- Git clone with --no-checkout in prepare_working_copy
- Refactor and simplify git prepare_working_copy
- Only use current dir if it actually looks like git (Fixes #202)
- reactivate test_obscpio_extract_d
- fix broken test create_archive
- fix broken tests for broken-links
- changed PREFIX in Gnumakefile to /usr
- new cli option --skip-cleanup
- fix for broken links
- fix reference to snapcraft YAML file
- fix docstring typo in TarSCM.scm.tar.fetch_upstream
- acknowledge deficiencies in dev docs
- wrap long lines in README
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-326
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for obs-service-tar_scm", "title": "Title of the patch" }, { "category": "description", "text": "This update for obs-service-tar_scm fixes the following issues:\n\nSecurity vulnerabilities addressed:\n\n- CVE-2018-12473: Fixed a path traversal issue, which allowed users to access\n files outside of the repository using relative paths (bsc#1105361)\n- CVE-2018-12474: Fixed an issue whereby crafted service parameters allowed for\n unexpected behaviour (bsc#1107507)\n- CVE-2018-12476: Fixed an issue whereby the outfilename parameter allowed to\n write files outside of package directory (bsc#1107944)\n\nOther bug fixes and changes made:\n\n- Prefer UTF-8 locale as output format for changes\n- added KankuFile\n- fix problems with unicode source files\n- added python-six to Requires in specfile\n- better encoding handling\n- fixes bsc#1082696 and bsc#1076410\n- fix unicode in containers\n- move to python3\n- added logging for better debugging changesgenerate\n- raise exception if no changesauthor given\n- Stop using @opensuse.org addresses to indicate a missing address\n- move argparse dep to -common package\n- allow submodule and ssl options in appimage\n- sync spec file as used in openSUSE:Tools project\n- check encoding problems for svn and print proper error msg\n- added new param \u0027--locale\u0027\n- separate service file installation in GNUmakefile\n- added glibc as Recommends in spec file\n- cleanup for broken svn caches\n- another fix for unicode problem in obs_scm\n- Final fix for unicode in filenames\n- Another attempt to fix unicode filenames in prep_tree_for_archive\n- Another attempt to fix unicode filenames in prep_tree_for_archive\n- fix bug with unicode filenames in prep_tree_for_archive\n- reuse _service*_servicedata/changes files from previous service runs\n- fix problems with unicode characters in commit messages for changeloggenerate\n- fix encoding issues if commit message contains utf8 char\n- revert encoding for old changes file\n- remove hardcoded utf-8 encodings\n- Add support for extract globbing\n- split pylint2 in GNUmakefile\n- fix check for \u0027--reproducible\u0027\n- create reproducible obscpio archives\n- fix regression from 44b3bee\n- Support also SSH urls for Git\n- check name/version option in obsinfo for slashes\n- check url for remote url\n- check symlinks in subdir parameter\n- check filename for slashes\n- disable follow_symlinks in extract feature\n- switch to obs_scm for this package\n- run download_files in appimage and snapcraft case\n- check --extract file path for parent dir\n- Fix parameter descriptions\n- changed os.removedirs -\u003e shutil.rmtree\n- Adding information regarding the *package-metadata* option for the *tar* service The tar service is highly useful in combination with the *obscpio* service. After the fix for the metadata for the latter one, it is important to inform the users of the *tar* service that metadata is kept only if the flag *package-metadata* is enabled. Add the flag to the .service file for mentioning that.\n- Allow metadata packing for CPIO archives when desired As of now, metadata are always excluded from *obscpio* packages. This is because the *package-metadata* flag is ignored; this change (should) make *obscpio* aware of it.\n- improve handling of corrupt git cache directories\n- only do git stash save/pop if we have a non-empty working tree (#228)\n- don\u0027t allow DEBUG_TAR_SCM to change behaviour (#240)\n- add stub user docs in lieu of something proper (#238)\n- Remove clone_dir if clone fails\n- python-unittest2 is only required for the optional make check\n- move python-unittest2 dep to test suite only part (submission by olh)\n- Removing redundant pass statement\n- missing import for logging functions.\n- [backend] Adding http proxy support\n- python-unittest2 is only required for the optional make check\n- make installation of scm\u0027s optional\n- add a lot more detail to README\n- Git clone with --no-checkout in prepare_working_copy\n- Refactor and simplify git prepare_working_copy\n- Only use current dir if it actually looks like git (Fixes #202)\n- reactivate test_obscpio_extract_d\n- fix broken test create_archive\n- fix broken tests for broken-links\n- changed PREFIX in Gnumakefile to /usr\n- new cli option --skip-cleanup\n- fix for broken links\n- fix reference to snapcraft YAML file\n- fix docstring typo in TarSCM.scm.tar.fetch_upstream\n- acknowledge deficiencies in dev docs\n- wrap long lines in README\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-326", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0326-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:0326-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24JIOIQBREAYJ3BG7I4ULI6HBEJZRTP6/#24JIOIQBREAYJ3BG7I4ULI6HBEJZRTP6" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:0326-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24JIOIQBREAYJ3BG7I4ULI6HBEJZRTP6/#24JIOIQBREAYJ3BG7I4ULI6HBEJZRTP6" }, { "category": "self", "summary": "SUSE Bug 1076410", "url": "https://bugzilla.suse.com/1076410" }, { "category": "self", "summary": "SUSE Bug 1082696", "url": "https://bugzilla.suse.com/1082696" }, { "category": "self", "summary": "SUSE Bug 1105361", "url": "https://bugzilla.suse.com/1105361" }, { "category": "self", "summary": "SUSE Bug 1107507", "url": "https://bugzilla.suse.com/1107507" }, { "category": "self", "summary": "SUSE Bug 1107944", "url": "https://bugzilla.suse.com/1107944" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12473 page", "url": "https://www.suse.com/security/cve/CVE-2018-12473/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12474 page", "url": "https://www.suse.com/security/cve/CVE-2018-12474/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12476 page", "url": "https://www.suse.com/security/cve/CVE-2018-12476/" } ], "title": "Security update for obs-service-tar_scm", "tracking": { "current_release_date": "2019-03-23T11:14:32Z", "generator": { "date": "2019-03-23T11:14:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:0326-1", "initial_release_date": "2019-03-23T11:14:32Z", "revision_history": [ { "date": "2019-03-23T11:14:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product": { "name": "obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product_id": "obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product": { "name": "obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product_id": "obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product": { "name": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product_id": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product": { "name": "obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product_id": "obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product": { "name": "obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product_id": "obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product": { "name": "obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product_id": "obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" }, "product_reference": "obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" }, "product_reference": "obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" }, "product_reference": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" }, "product_reference": "obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" }, "product_reference": "obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" }, "product_reference": "obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12473", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12473" } ], "notes": [ { "category": "general", "text": "A path traversal traversal vulnerability in obs-service-tar_scm of Open Build Service allows remote attackers to cause access files not in the current build. On the server itself this is prevented by confining the worker via KVM. Affected releases are openSUSE Open Build Service: versions prior to 70d1aa4cc4d7b940180553a63805c22fc62e2cf0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12473", "url": "https://www.suse.com/security/cve/CVE-2018-12473" }, { "category": "external", "summary": "SUSE Bug 1105361 for CVE-2018-12473", "url": "https://bugzilla.suse.com/1105361" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T11:14:32Z", "details": "important" } ], "title": "CVE-2018-12473" }, { "cve": "CVE-2018-12474", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12474" } ], "notes": [ { "category": "general", "text": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12474", "url": "https://www.suse.com/security/cve/CVE-2018-12474" }, { "category": "external", "summary": "SUSE Bug 1107507 for CVE-2018-12474", "url": "https://bugzilla.suse.com/1107507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T11:14:32Z", "details": "critical" } ], "title": "CVE-2018-12474" }, { "cve": "CVE-2018-12476", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12476" } ], "notes": [ { "category": "general", "text": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12476", "url": "https://www.suse.com/security/cve/CVE-2018-12476" }, { "category": "external", "summary": "SUSE Bug 1107944 for CVE-2018-12476", "url": "https://bugzilla.suse.com/1107944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T11:14:32Z", "details": "important" } ], "title": "CVE-2018-12476" } ] }
opensuse-su-2019:0329-1
Vulnerability from csaf_opensuse
Published
2019-03-15 06:52
Modified
2019-03-15 06:52
Summary
Security update for obs-service-tar_scm
Notes
Title of the patch
Security update for obs-service-tar_scm
Description of the patch
This update for obs-service-tar_scm fixes the following issues:
Security vulnerabilities addressed:
- CVE-2018-12473: Fixed a path traversal issue, which allowed users to access
files outside of the repository using relative paths (bsc#1105361)
- CVE-2018-12474: Fixed an issue whereby crafted service parameters allowed for
unexpected behaviour (bsc#1107507)
- CVE-2018-12476: Fixed an issue whereby the outfilename parameter allowed to
write files outside of package directory (bsc#1107944)
Other bug fixes and changes made:
- Prefer UTF-8 locale as output format for changes
- added KankuFile
- fix problems with unicode source files
- added python-six to Requires in specfile
- better encoding handling
- fixes bsc#1082696 and bsc#1076410
- fix unicode in containers
- move to python3
- added logging for better debugging changesgenerate
- raise exception if no changesauthor given
- Stop using @opensuse.org addresses to indicate a missing address
- move argparse dep to -common package
- allow submodule and ssl options in appimage
- sync spec file as used in openSUSE:Tools project
- check encoding problems for svn and print proper error msg
- added new param '--locale'
- separate service file installation in GNUmakefile
- added glibc as Recommends in spec file
- cleanup for broken svn caches
- another fix for unicode problem in obs_scm
- Final fix for unicode in filenames
- Another attempt to fix unicode filenames in prep_tree_for_archive
- Another attempt to fix unicode filenames in prep_tree_for_archive
- fix bug with unicode filenames in prep_tree_for_archive
- reuse _service*_servicedata/changes files from previous service runs
- fix problems with unicode characters in commit messages for changeloggenerate
- fix encoding issues if commit message contains utf8 char
- revert encoding for old changes file
- remove hardcoded utf-8 encodings
- Add support for extract globbing
- split pylint2 in GNUmakefile
- fix check for '--reproducible'
- create reproducible obscpio archives
- fix regression from 44b3bee
- Support also SSH urls for Git
- check name/version option in obsinfo for slashes
- check url for remote url
- check symlinks in subdir parameter
- check filename for slashes
- disable follow_symlinks in extract feature
- switch to obs_scm for this package
- run download_files in appimage and snapcraft case
- check --extract file path for parent dir
- Fix parameter descriptions
- changed os.removedirs -> shutil.rmtree
- Adding information regarding the *package-metadata* option for the *tar* service The tar service is highly useful in combination with the *obscpio* service. After the fix for the metadata for the latter one, it is important to inform the users of the *tar* service that metadata is kept only if the flag *package-metadata* is enabled. Add the flag to the .service file for mentioning that.
- Allow metadata packing for CPIO archives when desired As of now, metadata are always excluded from *obscpio* packages. This is because the *package-metadata* flag is ignored; this change (should) make *obscpio* aware of it.
- improve handling of corrupt git cache directories
- only do git stash save/pop if we have a non-empty working tree (#228)
- don't allow DEBUG_TAR_SCM to change behaviour (#240)
- add stub user docs in lieu of something proper (#238)
- Remove clone_dir if clone fails
- python-unittest2 is only required for the optional make check
- move python-unittest2 dep to test suite only part (submission by olh)
- Removing redundant pass statement
- missing import for logging functions.
- [backend] Adding http proxy support
- python-unittest2 is only required for the optional make check
- make installation of scm's optional
- add a lot more detail to README
- Git clone with --no-checkout in prepare_working_copy
- Refactor and simplify git prepare_working_copy
- Only use current dir if it actually looks like git (Fixes #202)
- reactivate test_obscpio_extract_d
- fix broken test create_archive
- fix broken tests for broken-links
- changed PREFIX in Gnumakefile to /usr
- new cli option --skip-cleanup
- fix for broken links
- fix reference to snapcraft YAML file
- fix docstring typo in TarSCM.scm.tar.fetch_upstream
- acknowledge deficiencies in dev docs
- wrap long lines in README
This update was imported from the SUSE:SLE-15:Update update project.
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patchnames
openSUSE-2019-329
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for obs-service-tar_scm", "title": "Title of the patch" }, { "category": "description", "text": "This update for obs-service-tar_scm fixes the following issues:\n\nSecurity vulnerabilities addressed:\n\n- CVE-2018-12473: Fixed a path traversal issue, which allowed users to access\n files outside of the repository using relative paths (bsc#1105361)\n- CVE-2018-12474: Fixed an issue whereby crafted service parameters allowed for\n unexpected behaviour (bsc#1107507)\n- CVE-2018-12476: Fixed an issue whereby the outfilename parameter allowed to\n write files outside of package directory (bsc#1107944)\n\nOther bug fixes and changes made:\n\n- Prefer UTF-8 locale as output format for changes\n- added KankuFile\n- fix problems with unicode source files\n- added python-six to Requires in specfile\n- better encoding handling\n- fixes bsc#1082696 and bsc#1076410\n- fix unicode in containers\n- move to python3\n- added logging for better debugging changesgenerate\n- raise exception if no changesauthor given\n- Stop using @opensuse.org addresses to indicate a missing address\n- move argparse dep to -common package\n- allow submodule and ssl options in appimage\n- sync spec file as used in openSUSE:Tools project\n- check encoding problems for svn and print proper error msg\n- added new param \u0027--locale\u0027\n- separate service file installation in GNUmakefile\n- added glibc as Recommends in spec file\n- cleanup for broken svn caches\n- another fix for unicode problem in obs_scm\n- Final fix for unicode in filenames\n- Another attempt to fix unicode filenames in prep_tree_for_archive\n- Another attempt to fix unicode filenames in prep_tree_for_archive\n- fix bug with unicode filenames in prep_tree_for_archive\n- reuse _service*_servicedata/changes files from previous service runs\n- fix problems with unicode characters in commit messages for changeloggenerate\n- fix encoding issues if commit message contains utf8 char\n- revert encoding for old changes file\n- remove hardcoded utf-8 encodings\n- Add support for extract globbing\n- split pylint2 in GNUmakefile\n- fix check for \u0027--reproducible\u0027\n- create reproducible obscpio archives\n- fix regression from 44b3bee\n- Support also SSH urls for Git\n- check name/version option in obsinfo for slashes\n- check url for remote url\n- check symlinks in subdir parameter\n- check filename for slashes\n- disable follow_symlinks in extract feature\n- switch to obs_scm for this package\n- run download_files in appimage and snapcraft case\n- check --extract file path for parent dir\n- Fix parameter descriptions\n- changed os.removedirs -\u003e shutil.rmtree\n- Adding information regarding the *package-metadata* option for the *tar* service The tar service is highly useful in combination with the *obscpio* service. After the fix for the metadata for the latter one, it is important to inform the users of the *tar* service that metadata is kept only if the flag *package-metadata* is enabled. Add the flag to the .service file for mentioning that.\n- Allow metadata packing for CPIO archives when desired As of now, metadata are always excluded from *obscpio* packages. This is because the *package-metadata* flag is ignored; this change (should) make *obscpio* aware of it.\n- improve handling of corrupt git cache directories\n- only do git stash save/pop if we have a non-empty working tree (#228)\n- don\u0027t allow DEBUG_TAR_SCM to change behaviour (#240)\n- add stub user docs in lieu of something proper (#238)\n- Remove clone_dir if clone fails\n- python-unittest2 is only required for the optional make check\n- move python-unittest2 dep to test suite only part (submission by olh)\n- Removing redundant pass statement\n- missing import for logging functions.\n- [backend] Adding http proxy support\n- python-unittest2 is only required for the optional make check\n- make installation of scm\u0027s optional\n- add a lot more detail to README\n- Git clone with --no-checkout in prepare_working_copy\n- Refactor and simplify git prepare_working_copy\n- Only use current dir if it actually looks like git (Fixes #202)\n- reactivate test_obscpio_extract_d\n- fix broken test create_archive\n- fix broken tests for broken-links\n- changed PREFIX in Gnumakefile to /usr\n- new cli option --skip-cleanup\n- fix for broken links\n- fix reference to snapcraft YAML file\n- fix docstring typo in TarSCM.scm.tar.fetch_upstream\n- acknowledge deficiencies in dev docs\n- wrap long lines in README\n\nThis update was imported from the SUSE:SLE-15:Update update project.\nThis update was imported from the openSUSE:Leap:15.0:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-329", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0329-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:0329-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKGGMO3NGZX2ZLQDMAHVVJX4HZMC2X3E/#SKGGMO3NGZX2ZLQDMAHVVJX4HZMC2X3E" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:0329-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKGGMO3NGZX2ZLQDMAHVVJX4HZMC2X3E/#SKGGMO3NGZX2ZLQDMAHVVJX4HZMC2X3E" }, { "category": "self", "summary": "SUSE Bug 1076410", "url": "https://bugzilla.suse.com/1076410" }, { "category": "self", "summary": "SUSE Bug 1082696", "url": "https://bugzilla.suse.com/1082696" }, { "category": "self", "summary": "SUSE Bug 1105361", "url": "https://bugzilla.suse.com/1105361" }, { "category": "self", "summary": "SUSE Bug 1107507", "url": "https://bugzilla.suse.com/1107507" }, { "category": "self", "summary": "SUSE Bug 1107944", "url": "https://bugzilla.suse.com/1107944" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12473 page", "url": "https://www.suse.com/security/cve/CVE-2018-12473/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12474 page", "url": "https://www.suse.com/security/cve/CVE-2018-12474/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12476 page", "url": "https://www.suse.com/security/cve/CVE-2018-12476/" } ], "title": "Security update for obs-service-tar_scm", "tracking": { "current_release_date": "2019-03-15T06:52:27Z", "generator": { "date": "2019-03-15T06:52:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:0329-1", "initial_release_date": "2019-03-15T06:52:27Z", "revision_history": [ { "date": "2019-03-15T06:52:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product": { "name": "obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product_id": "obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product": { "name": "obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product_id": "obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product": { "name": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product_id": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product": { "name": "obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product_id": "obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product": { "name": "obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product_id": "obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product": { "name": "obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product_id": "obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15", "product": { "name": "SUSE Package Hub 15", "product_id": "SUSE Package Hub 15" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" }, "product_reference": "obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" }, "product_reference": "obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" }, "product_reference": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" }, "product_reference": "obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" }, "product_reference": "obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" }, "product_reference": "obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12473", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12473" } ], "notes": [ { "category": "general", "text": "A path traversal traversal vulnerability in obs-service-tar_scm of Open Build Service allows remote attackers to cause access files not in the current build. On the server itself this is prevented by confining the worker via KVM. Affected releases are openSUSE Open Build Service: versions prior to 70d1aa4cc4d7b940180553a63805c22fc62e2cf0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12473", "url": "https://www.suse.com/security/cve/CVE-2018-12473" }, { "category": "external", "summary": "SUSE Bug 1105361 for CVE-2018-12473", "url": "https://bugzilla.suse.com/1105361" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-15T06:52:27Z", "details": "important" } ], "title": "CVE-2018-12473" }, { "cve": "CVE-2018-12474", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12474" } ], "notes": [ { "category": "general", "text": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12474", "url": "https://www.suse.com/security/cve/CVE-2018-12474" }, { "category": "external", "summary": "SUSE Bug 1107507 for CVE-2018-12474", "url": "https://bugzilla.suse.com/1107507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-15T06:52:27Z", "details": "critical" } ], "title": "CVE-2018-12474" }, { "cve": "CVE-2018-12476", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12476" } ], "notes": [ { "category": "general", "text": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12476", "url": "https://www.suse.com/security/cve/CVE-2018-12476" }, { "category": "external", "summary": "SUSE Bug 1107944 for CVE-2018-12476", "url": "https://bugzilla.suse.com/1107944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-15T06:52:27Z", "details": "important" } ], "title": "CVE-2018-12476" } ] }
ghsa-7vq9-fwhq-w55p
Vulnerability from github
Published
2022-05-24 17:07
Modified
2022-05-24 17:07
VLAI Severity ?
Details
Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.
{ "affected": [], "aliases": [ "CVE-2018-12476" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-01-27T09:15:00Z", "severity": "MODERATE" }, "details": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.", "id": "GHSA-7vq9-fwhq-w55p", "modified": "2022-05-24T17:07:24Z", "published": "2022-05-24T17:07:24Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12476" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107944" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2018-12476
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-12476", "description": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.", "id": "GSD-2018-12476", "references": [ "https://www.suse.com/security/cve/CVE-2018-12476.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-12476" ], "details": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.", "id": "GSD-2018-12476", "modified": "2023-12-13T01:22:29.860724Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2020-01-27T00:00:00.000Z", "ID": "CVE-2018-12476", "STATE": "PUBLIC", "TITLE": "obs-service-extract_file\u0027s outfilename parameter allows to write files outside of package directory" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SUSE Linux Enterprise Server 15", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "obs-service-tar_scm", "version_value": "0.9.2.1537788075.fefaa74:" } ] } } ] }, "vendor_name": "SUSE" }, { "product": { "product_data": [ { "product_name": "Factory", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "obs-service-tar_scm", "version_value": "0.9.2.1537788075.fefaa74" } ] } } ] }, "vendor_name": "openSUSE" } ] } }, "credit": [ { "lang": "eng", "value": "Matthias Gerstner of SUSE" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-23: Relative Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1107944", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107944" } ] }, "source": { "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1107944", "defect": [ "1107944" ], "discovery": "INTERNAL" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:suse:obs-service-tar_scm:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.9.2.1537788075.fefaa74", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:suse:obs-service-tar_scm:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.9.2.1537788075.fefaa74", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:opensuse_factory:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@suse.com", "ID": "CVE-2018-12476" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-22" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1107944", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107944" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2020-02-05T14:44Z", "publishedDate": "2020-01-27T09:15Z" } } }
fkie_cve-2018-12476
Vulnerability from fkie_nvd
Published
2020-01-27 09:15
Modified
2024-11-21 03:45
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
suse | obs-service-tar_scm | * | |
suse | suse_linux_enterprise_server | 15 | |
suse | obs-service-tar_scm | * | |
suse | opensuse_factory | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:obs-service-tar_scm:*:*:*:*:*:*:*:*", "matchCriteriaId": "E397B638-1DD2-4314-83B9-F654DE1B4619", "versionEndExcluding": "0.9.2.1537788075.fefaa74", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:15:*:*:*:*:*:*:*", "matchCriteriaId": "AF73A3D9-6566-4CBF-AA5F-5A4B99719A1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:obs-service-tar_scm:*:*:*:*:*:*:*:*", "matchCriteriaId": "E397B638-1DD2-4314-83B9-F654DE1B4619", "versionEndExcluding": "0.9.2.1537788075.fefaa74", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:opensuse_factory:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D9A5D6-4B12-4B25-ACD2-560C864B6FE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74." }, { "lang": "es", "value": "Una vulnerabilidad de Salto de Ruta Relativa en obs-service-tar_scm de SUSE Linux Enterprise Server versi\u00f3n 15; openSUSE Factory, permite a atacantes remotos con control sobre un repositorio sobrescribir archivos en la m\u00e1quina del usuario local si un servicio malicioso es ejecutado. Este problema afecta a: obs-service-tar_scm versiones anteriores a 0.9.2.1537788075.fefaa74 de SUSE Linux Enterprise Server versi\u00f3n 15. obs-service-tar_scm versiones anteriores a 0.9.2.1537788075.fefaa74 de openSUSE Factory." } ], "id": "CVE-2018-12476", "lastModified": "2024-11-21T03:45:17.570", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security@opentext.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-27T09:15:11.100", "references": [ { "source": "security@opentext.com", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107944" } ], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-23" } ], "source": "security@opentext.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…