Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.0676 SUSE-SU-2019:0540-1 Security update for obs-service-tar_scm 5 March 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: obs-service-tar_scm Publisher: SUSE Operating System: SUSE Impact/Access: Modify Arbitrary Files -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2018-12476 CVE-2018-12474 CVE-2018-12473 Original Bulletin: https://www.suse.com/support/update/announcement/2019/suse-su-20190540-1.html - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for obs-service-tar_scm ______________________________________________________________________________ Announcement ID: SUSE-SU-2019:0540-1 Rating: important References: #1076410 #1082696 #1105361 #1107507 #1107944 Cross-References: CVE-2018-12473 CVE-2018-12474 CVE-2018-12476 Affected Products: SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 ______________________________________________________________________________ An update that solves three vulnerabilities and has two fixes is now available. Description: This update for obs-service-tar_scm fixes the following issues: Security vulnerabilities addressed: o CVE-2018-12473: Fixed a path traversal issue, which allowed users to access files outside of the repository using relative paths (bsc#1105361) o CVE-2018-12474: Fixed an issue whereby crafted service parameters allowed for unexpected behaviour (bsc#1107507) o CVE-2018-12476: Fixed an issue whereby the outfilename parameter allowed to write files outside of package directory (bsc#1107944) Other bug fixes and changes made: o Prefer UTF-8 locale as output format for changes o added KankuFile o fix problems with unicode source files o added python-six to Requires in specfile o better encoding handling o fixes bsc#1082696 and bsc#1076410 o fix unicode in containers o move to python3 o added logging for better debugging changesgenerate o raise exception if no changesauthor given o Stop using @opensuse.org addresses to indicate a missing address o move argparse dep to -common package o allow submodule and ssl options in appimage o sync spec file as used in openSUSE:Tools project o check encoding problems for svn and print proper error msg o added new param '--locale' o separate service file installation in GNUmakefile o added glibc as Recommends in spec file o cleanup for broken svn caches o another fix for unicode problem in obs_scm o Final fix for unicode in filenames o Another attempt to fix unicode filenames in prep_tree_for_archive o Another attempt to fix unicode filenames in prep_tree_for_archive o fix bug with unicode filenames in prep_tree_for_archive o reuse _service*_servicedata/changes files from previous service runs o fix problems with unicode characters in commit messages for changeloggenerate o fix encoding issues if commit message contains utf8 char o revert encoding for old changes file o remove hardcoded utf-8 encodings o Add support for extract globbing o split pylint2 in GNUmakefile o fix check for "--reproducible" o create reproducible obscpio archives o fix regression from 44b3bee o Support also SSH urls for Git o check name/version option in obsinfo for slashes o check url for remote url o check symlinks in subdir parameter o check filename for slashes o disable follow_symlinks in extract feature o switch to obs_scm for this package o run download_files in appimage and snapcraft case o check --extract file path for parent dir o Fix parameter descriptions o changed os.removedirs -> shutil.rmtree o Adding information regarding the *package-metadata* option for the *tar* service The tar service is highly useful in combination with the *obscpio* service. After the fix for the metadata for the latter one, it is important to inform the users of the *tar* service that metadata is kept only if the flag *package-metadata* is enabled. Add the flag to the .service file for mentioning that. o Allow metadata packing for CPIO archives when desired As of now, metadata are always excluded from *obscpio* packages. This is because the *package-metadata* flag is ignored; this change (should) make *obscpio* aware of it. o improve handling of corrupt git cache directories o only do git stash save/pop if we have a non-empty working tree (#228) o don't allow DEBUG_TAR_SCM to change behaviour (#240) o add stub user docs in lieu of something proper (#238) o Remove clone_dir if clone fails o python-unittest2 is only required for the optional make check o move python-unittest2 dep to test suite only part (submission by olh) o Removing redundant pass statement o missing import for logging functions. o [backend] Adding http proxy support o python-unittest2 is only required for the optional make check o make installation of scm's optional o add a lot more detail to README o Git clone with --no-checkout in prepare_working_copy o Refactor and simplify git prepare_working_copy o Only use current dir if it actually looks like git (Fixes #202) o reactivate test_obscpio_extract_d o fix broken test create_archive o fix broken tests for broken-links o changed PREFIX in Gnumakefile to /usr o new cli option --skip-cleanup o fix for broken links o fix reference to snapcraft YAML file o fix docstring typo in TarSCM.scm.tar.fetch_upstream o acknowledge deficiencies in dev docs o wrap long lines in README Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15: zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-540=1 Package List: o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (noarch): obs-service-appimage-0.10.5.1551309990.79898c7-3.3.1 obs-service-obs_scm-0.10.5.1551309990.79898c7-3.3.1 obs-service-obs_scm-common-0.10.5.1551309990.79898c7-3.3.1 obs-service-snapcraft-0.10.5.1551309990.79898c7-3.3.1 obs-service-tar-0.10.5.1551309990.79898c7-3.3.1 obs-service-tar_scm-0.10.5.1551309990.79898c7-3.3.1 References: o https://www.suse.com/security/cve/CVE-2018-12473.html o https://www.suse.com/security/cve/CVE-2018-12474.html o https://www.suse.com/security/cve/CVE-2018-12476.html o https://bugzilla.suse.com/1076410 o https://bugzilla.suse.com/1082696 o https://bugzilla.suse.com/1105361 o https://bugzilla.suse.com/1107507 o https://bugzilla.suse.com/1107944 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXH3Rj2aOgq3Tt24GAQi3tBAAwZIYOGMA4ubZrB9Lh0LHqvX1X0hU0AId HX8X34HEEIqBlvI0oLkxtnYkyrFBafRrd4kUhb873pFBDR44EhZUpuCNPOZTmC9w 9gn4NaU7FwDbm7CFw3yc1K+ePJ6zkQoATFt6EBGxVuYykto9wiIE99Wakh3vnFtc BqQjLUBhwmn/d7JR+inO63aupoJbjRl8cOWVEjRduSBAkzfeKZJWt1a6TcbSJcRL k/6qbcsGqxpZN+OPk6QRdAw8sEfJIBvRsR5KHaFjpZSxPZIKibpYv8mn90Yy/JUG t8o2vH4omlNo1mF7OE1+be0WlgIrMtCDydqFk9Nk+XJ6afS1C2rDoH7xV85+LZRu NrCiKLvgM5RXuUVm8wIQ8lK3tHdhkVzfbmnZDkkWzY1gfsH1Pw8gmSIBq96Prb95 cJhyug2r07i4tK2dftCwVVwMSHGcWuvCFVv6nYoEnEbM+obPMOutTBi0rRokONul 8p4/8mRy/XJbz9gHzlKCfZ6RgT7zqraazc2PN8hjt+nMrhTHoec57a1jPLYEK4QR 30qAQUmIWGbgTJiLMiu0BXv/vDqC5r743GcOH13nCx/nOgV48bDC0D4q/DxcFYU+ FssQy9hn6+PgOAWvn7cVy4HSW3R9C/xoZXBw1eljxn5+eEHNn37TYYZRy/UcGAkb gzjKtt5HnPg= =VL9Q -----END PGP SIGNATURE-----