ESB-2019.0676 - [SUSE] obs-service-tar_scm: Multiple vulnerabilities 2019-03-05

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.0676
        SUSE-SU-2019:0540-1 Security update for obs-service-tar_scm
                               5 March 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           obs-service-tar_scm
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-12476 CVE-2018-12474 CVE-2018-12473

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2019/suse-su-20190540-1.html

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for obs-service-tar_scm
______________________________________________________________________________

Announcement ID:   SUSE-SU-2019:0540-1
Rating:            important
References:        #1076410 #1082696 #1105361 #1107507 #1107944
Cross-References:  CVE-2018-12473 CVE-2018-12474 CVE-2018-12476
Affected Products:
                   SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
______________________________________________________________________________

An update that solves three vulnerabilities and has two fixes is now available.

Description:

This update for obs-service-tar_scm fixes the following issues:
Security vulnerabilities addressed:

  o CVE-2018-12473: Fixed a path traversal issue, which allowed users to access
    files outside of the repository using relative paths (bsc#1105361)
  o CVE-2018-12474: Fixed an issue whereby crafted service parameters allowed
    for unexpected behaviour (bsc#1107507)
  o CVE-2018-12476: Fixed an issue whereby the outfilename parameter allowed to
    write files outside of package directory (bsc#1107944)


Other bug fixes and changes made:

  o Prefer UTF-8 locale as output format for changes
  o added KankuFile
  o fix problems with unicode source files
  o added python-six to Requires in specfile
  o better encoding handling
  o fixes bsc#1082696 and bsc#1076410
  o fix unicode in containers
  o move to python3
  o added logging for better debugging changesgenerate
  o raise exception if no changesauthor given
  o Stop using @opensuse.org addresses to indicate a missing address
  o move argparse dep to -common package
  o allow submodule and ssl options in appimage
  o sync spec file as used in openSUSE:Tools project
  o check encoding problems for svn and print proper error msg
  o added new param '--locale'
  o separate service file installation in GNUmakefile
  o added glibc as Recommends in spec file
  o cleanup for broken svn caches
  o another fix for unicode problem in obs_scm
  o Final fix for unicode in filenames
  o Another attempt to fix unicode filenames in prep_tree_for_archive
  o Another attempt to fix unicode filenames in prep_tree_for_archive
  o fix bug with unicode filenames in prep_tree_for_archive
  o reuse _service*_servicedata/changes files from previous service runs
  o fix problems with unicode characters in commit messages for
    changeloggenerate
  o fix encoding issues if commit message contains utf8 char
  o revert encoding for old changes file
  o remove hardcoded utf-8 encodings
  o Add support for extract globbing
  o split pylint2 in GNUmakefile
  o fix check for "--reproducible"
  o create reproducible obscpio archives
  o fix regression from 44b3bee
  o Support also SSH urls for Git
  o check name/version option in obsinfo for slashes
  o check url for remote url
  o check symlinks in subdir parameter
  o check filename for slashes
  o disable follow_symlinks in extract feature
  o switch to obs_scm for this package
  o run download_files in appimage and snapcraft case
  o check --extract file path for parent dir
  o Fix parameter descriptions
  o changed os.removedirs -> shutil.rmtree
  o Adding information regarding the *package-metadata* option for the *tar*
    service The tar service is highly useful in combination with the *obscpio*
    service. After the fix for the metadata for the latter one, it is important
    to inform the users of the *tar* service that metadata is kept only if the
    flag *package-metadata* is enabled. Add the flag to the .service file for
    mentioning that.
  o Allow metadata packing for CPIO archives when desired As of now, metadata
    are always excluded from *obscpio* packages. This is because the
    *package-metadata* flag is ignored; this change (should) make *obscpio*
    aware of it.
  o improve handling of corrupt git cache directories
  o only do git stash save/pop if we have a non-empty working tree (#228)
  o don't allow DEBUG_TAR_SCM to change behaviour (#240)
  o add stub user docs in lieu of something proper (#238)
  o Remove clone_dir if clone fails
  o python-unittest2 is only required for the optional make check
  o move python-unittest2 dep to test suite only part (submission by olh)
  o Removing redundant pass statement
  o missing import for logging functions.
  o [backend] Adding http proxy support
  o python-unittest2 is only required for the optional make check
  o make installation of scm's optional
  o add a lot more detail to README
  o Git clone with --no-checkout in prepare_working_copy
  o Refactor and simplify git prepare_working_copy
  o Only use current dir if it actually looks like git (Fixes #202)
  o reactivate test_obscpio_extract_d
  o fix broken test create_archive
  o fix broken tests for broken-links
  o changed PREFIX in Gnumakefile to /usr
  o new cli option --skip-cleanup
  o fix for broken links
  o fix reference to snapcraft YAML file
  o fix docstring typo in TarSCM.scm.tar.fetch_upstream
  o acknowledge deficiencies in dev docs
  o wrap long lines in README

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15:
    zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-540=1

Package List:

  o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
    (noarch):
       obs-service-appimage-0.10.5.1551309990.79898c7-3.3.1
       obs-service-obs_scm-0.10.5.1551309990.79898c7-3.3.1
       obs-service-obs_scm-common-0.10.5.1551309990.79898c7-3.3.1
       obs-service-snapcraft-0.10.5.1551309990.79898c7-3.3.1
       obs-service-tar-0.10.5.1551309990.79898c7-3.3.1
       obs-service-tar_scm-0.10.5.1551309990.79898c7-3.3.1


References:

  o https://www.suse.com/security/cve/CVE-2018-12473.html
  o https://www.suse.com/security/cve/CVE-2018-12474.html
  o https://www.suse.com/security/cve/CVE-2018-12476.html
  o https://bugzilla.suse.com/1076410
  o https://bugzilla.suse.com/1082696
  o https://bugzilla.suse.com/1105361
  o https://bugzilla.suse.com/1107507
  o https://bugzilla.suse.com/1107944

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=VL9Q
-----END PGP SIGNATURE-----

« Back to bulletins