Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-12474 (GCVE-0-2018-12474)
Vulnerability from cvelistv5
- CWE-20 - Improper Input Validation
Vendor | Product | Version | ||
---|---|---|---|---|
openSUSE | Open Build Service |
Version: unspecified < 51a17c553b6ae2598820b7a90fd0c11502a49106 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:38:06.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/openSUSE/obs-service-tar_scm/pull/254" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107507" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Open Build Service", "vendor": "openSUSE", "versions": [ { "lessThan": "51a17c553b6ae2598820b7a90fd0c11502a49106", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Matthias Gerstner of SUSE" } ], "datePublic": "2018-09-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:54", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openSUSE/obs-service-tar_scm/pull/254" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107507" } ], "source": { "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1107507", "defect": [ "https://bugzilla.suse.com/show_bug.cgi?id=1107507" ], "discovery": "INTERNAL" }, "title": "Crafted service parameters allows to induce unexpected behaviour in obs-service-tar_scm", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-09-26T00:00:00.000Z", "ID": "CVE-2018-12474", "STATE": "PUBLIC", "TITLE": "Crafted service parameters allows to induce unexpected behaviour in obs-service-tar_scm" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Open Build Service", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "51a17c553b6ae2598820b7a90fd0c11502a49106" } ] } } ] }, "vendor_name": "openSUSE" } ] } }, "credit": [ { "lang": "eng", "value": "Matthias Gerstner of SUSE" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/openSUSE/obs-service-tar_scm/pull/254", "refsource": "CONFIRM", "url": "https://github.com/openSUSE/obs-service-tar_scm/pull/254" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1107507", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107507" } ] }, "source": { "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1107507", "defect": [ "https://bugzilla.suse.com/show_bug.cgi?id=1107507" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2018-12474", "datePublished": "2018-10-09T13:00:00Z", "dateReserved": "2018-06-15T00:00:00", "dateUpdated": "2024-09-16T18:19:31.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-12474\",\"sourceIdentifier\":\"security@opentext.com\",\"published\":\"2018-10-09T13:29:00.400\",\"lastModified\":\"2024-11-21T03:45:17.320\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.\"},{\"lang\":\"es\",\"value\":\"Validaci\u00f3n de entradas incorrecta en obs-service-tar_scm en Open Build Service permite que los atacantes remotos puedaqn acceder y extraer informaci\u00f3n fuera de la build actual o crear archivos en ubicaciones controladas por el atacante. Las versiones afectadas son openSUSE Open Build Service en versiones anteriores a la 51a17c553b6ae2598820b7a90fd0c11502a49106.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"security@opentext.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@opentext.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:tar_scm:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.9.3\",\"matchCriteriaId\":\"0076F11D-90A0-41F2-836B-B5A08EF34927\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1107507\",\"source\":\"security@opentext.com\"},{\"url\":\"https://github.com/openSUSE/obs-service-tar_scm/pull/254\",\"source\":\"security@opentext.com\"},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1107507\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/openSUSE/obs-service-tar_scm/pull/254\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
opensuse-su-2019:0326-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for obs-service-tar_scm", "title": "Title of the patch" }, { "category": "description", "text": "This update for obs-service-tar_scm fixes the following issues:\n\nSecurity vulnerabilities addressed:\n\n- CVE-2018-12473: Fixed a path traversal issue, which allowed users to access\n files outside of the repository using relative paths (bsc#1105361)\n- CVE-2018-12474: Fixed an issue whereby crafted service parameters allowed for\n unexpected behaviour (bsc#1107507)\n- CVE-2018-12476: Fixed an issue whereby the outfilename parameter allowed to\n write files outside of package directory (bsc#1107944)\n\nOther bug fixes and changes made:\n\n- Prefer UTF-8 locale as output format for changes\n- added KankuFile\n- fix problems with unicode source files\n- added python-six to Requires in specfile\n- better encoding handling\n- fixes bsc#1082696 and bsc#1076410\n- fix unicode in containers\n- move to python3\n- added logging for better debugging changesgenerate\n- raise exception if no changesauthor given\n- Stop using @opensuse.org addresses to indicate a missing address\n- move argparse dep to -common package\n- allow submodule and ssl options in appimage\n- sync spec file as used in openSUSE:Tools project\n- check encoding problems for svn and print proper error msg\n- added new param \u0027--locale\u0027\n- separate service file installation in GNUmakefile\n- added glibc as Recommends in spec file\n- cleanup for broken svn caches\n- another fix for unicode problem in obs_scm\n- Final fix for unicode in filenames\n- Another attempt to fix unicode filenames in prep_tree_for_archive\n- Another attempt to fix unicode filenames in prep_tree_for_archive\n- fix bug with unicode filenames in prep_tree_for_archive\n- reuse _service*_servicedata/changes files from previous service runs\n- fix problems with unicode characters in commit messages for changeloggenerate\n- fix encoding issues if commit message contains utf8 char\n- revert encoding for old changes file\n- remove hardcoded utf-8 encodings\n- Add support for extract globbing\n- split pylint2 in GNUmakefile\n- fix check for \u0027--reproducible\u0027\n- create reproducible obscpio archives\n- fix regression from 44b3bee\n- Support also SSH urls for Git\n- check name/version option in obsinfo for slashes\n- check url for remote url\n- check symlinks in subdir parameter\n- check filename for slashes\n- disable follow_symlinks in extract feature\n- switch to obs_scm for this package\n- run download_files in appimage and snapcraft case\n- check --extract file path for parent dir\n- Fix parameter descriptions\n- changed os.removedirs -\u003e shutil.rmtree\n- Adding information regarding the *package-metadata* option for the *tar* service The tar service is highly useful in combination with the *obscpio* service. After the fix for the metadata for the latter one, it is important to inform the users of the *tar* service that metadata is kept only if the flag *package-metadata* is enabled. Add the flag to the .service file for mentioning that.\n- Allow metadata packing for CPIO archives when desired As of now, metadata are always excluded from *obscpio* packages. This is because the *package-metadata* flag is ignored; this change (should) make *obscpio* aware of it.\n- improve handling of corrupt git cache directories\n- only do git stash save/pop if we have a non-empty working tree (#228)\n- don\u0027t allow DEBUG_TAR_SCM to change behaviour (#240)\n- add stub user docs in lieu of something proper (#238)\n- Remove clone_dir if clone fails\n- python-unittest2 is only required for the optional make check\n- move python-unittest2 dep to test suite only part (submission by olh)\n- Removing redundant pass statement\n- missing import for logging functions.\n- [backend] Adding http proxy support\n- python-unittest2 is only required for the optional make check\n- make installation of scm\u0027s optional\n- add a lot more detail to README\n- Git clone with --no-checkout in prepare_working_copy\n- Refactor and simplify git prepare_working_copy\n- Only use current dir if it actually looks like git (Fixes #202)\n- reactivate test_obscpio_extract_d\n- fix broken test create_archive\n- fix broken tests for broken-links\n- changed PREFIX in Gnumakefile to /usr\n- new cli option --skip-cleanup\n- fix for broken links\n- fix reference to snapcraft YAML file\n- fix docstring typo in TarSCM.scm.tar.fetch_upstream\n- acknowledge deficiencies in dev docs\n- wrap long lines in README\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-326", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0326-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:0326-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24JIOIQBREAYJ3BG7I4ULI6HBEJZRTP6/#24JIOIQBREAYJ3BG7I4ULI6HBEJZRTP6" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:0326-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24JIOIQBREAYJ3BG7I4ULI6HBEJZRTP6/#24JIOIQBREAYJ3BG7I4ULI6HBEJZRTP6" }, { "category": "self", "summary": "SUSE Bug 1076410", "url": "https://bugzilla.suse.com/1076410" }, { "category": "self", "summary": "SUSE Bug 1082696", "url": "https://bugzilla.suse.com/1082696" }, { "category": "self", "summary": "SUSE Bug 1105361", "url": "https://bugzilla.suse.com/1105361" }, { "category": "self", "summary": "SUSE Bug 1107507", "url": "https://bugzilla.suse.com/1107507" }, { "category": "self", "summary": "SUSE Bug 1107944", "url": "https://bugzilla.suse.com/1107944" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12473 page", "url": "https://www.suse.com/security/cve/CVE-2018-12473/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12474 page", "url": "https://www.suse.com/security/cve/CVE-2018-12474/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12476 page", "url": "https://www.suse.com/security/cve/CVE-2018-12476/" } ], "title": "Security update for obs-service-tar_scm", "tracking": { "current_release_date": "2019-03-23T11:14:32Z", "generator": { "date": "2019-03-23T11:14:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:0326-1", "initial_release_date": "2019-03-23T11:14:32Z", "revision_history": [ { "date": "2019-03-23T11:14:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product": { "name": "obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product_id": "obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product": { "name": "obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product_id": "obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product": { "name": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product_id": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product": { "name": "obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product_id": "obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product": { "name": "obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product_id": "obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product": { "name": "obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "product_id": "obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" }, "product_reference": "obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" }, "product_reference": "obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" }, "product_reference": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" }, "product_reference": "obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" }, "product_reference": "obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" }, "product_reference": "obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12473", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12473" } ], "notes": [ { "category": "general", "text": "A path traversal traversal vulnerability in obs-service-tar_scm of Open Build Service allows remote attackers to cause access files not in the current build. On the server itself this is prevented by confining the worker via KVM. Affected releases are openSUSE Open Build Service: versions prior to 70d1aa4cc4d7b940180553a63805c22fc62e2cf0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12473", "url": "https://www.suse.com/security/cve/CVE-2018-12473" }, { "category": "external", "summary": "SUSE Bug 1105361 for CVE-2018-12473", "url": "https://bugzilla.suse.com/1105361" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T11:14:32Z", "details": "important" } ], "title": "CVE-2018-12473" }, { "cve": "CVE-2018-12474", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12474" } ], "notes": [ { "category": "general", "text": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12474", "url": "https://www.suse.com/security/cve/CVE-2018-12474" }, { "category": "external", "summary": "SUSE Bug 1107507 for CVE-2018-12474", "url": "https://bugzilla.suse.com/1107507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T11:14:32Z", "details": "critical" } ], "title": "CVE-2018-12474" }, { "cve": "CVE-2018-12476", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12476" } ], "notes": [ { "category": "general", "text": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12476", "url": "https://www.suse.com/security/cve/CVE-2018-12476" }, { "category": "external", "summary": "SUSE Bug 1107944 for CVE-2018-12476", "url": "https://bugzilla.suse.com/1107944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:obs-service-appimage-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-snapcraft-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch", "openSUSE Leap 15.0:obs-service-tar_scm-0.10.5.1551309990.79898c7-lp150.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T11:14:32Z", "details": "important" } ], "title": "CVE-2018-12476" } ] }
opensuse-su-2019:0329-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for obs-service-tar_scm", "title": "Title of the patch" }, { "category": "description", "text": "This update for obs-service-tar_scm fixes the following issues:\n\nSecurity vulnerabilities addressed:\n\n- CVE-2018-12473: Fixed a path traversal issue, which allowed users to access\n files outside of the repository using relative paths (bsc#1105361)\n- CVE-2018-12474: Fixed an issue whereby crafted service parameters allowed for\n unexpected behaviour (bsc#1107507)\n- CVE-2018-12476: Fixed an issue whereby the outfilename parameter allowed to\n write files outside of package directory (bsc#1107944)\n\nOther bug fixes and changes made:\n\n- Prefer UTF-8 locale as output format for changes\n- added KankuFile\n- fix problems with unicode source files\n- added python-six to Requires in specfile\n- better encoding handling\n- fixes bsc#1082696 and bsc#1076410\n- fix unicode in containers\n- move to python3\n- added logging for better debugging changesgenerate\n- raise exception if no changesauthor given\n- Stop using @opensuse.org addresses to indicate a missing address\n- move argparse dep to -common package\n- allow submodule and ssl options in appimage\n- sync spec file as used in openSUSE:Tools project\n- check encoding problems for svn and print proper error msg\n- added new param \u0027--locale\u0027\n- separate service file installation in GNUmakefile\n- added glibc as Recommends in spec file\n- cleanup for broken svn caches\n- another fix for unicode problem in obs_scm\n- Final fix for unicode in filenames\n- Another attempt to fix unicode filenames in prep_tree_for_archive\n- Another attempt to fix unicode filenames in prep_tree_for_archive\n- fix bug with unicode filenames in prep_tree_for_archive\n- reuse _service*_servicedata/changes files from previous service runs\n- fix problems with unicode characters in commit messages for changeloggenerate\n- fix encoding issues if commit message contains utf8 char\n- revert encoding for old changes file\n- remove hardcoded utf-8 encodings\n- Add support for extract globbing\n- split pylint2 in GNUmakefile\n- fix check for \u0027--reproducible\u0027\n- create reproducible obscpio archives\n- fix regression from 44b3bee\n- Support also SSH urls for Git\n- check name/version option in obsinfo for slashes\n- check url for remote url\n- check symlinks in subdir parameter\n- check filename for slashes\n- disable follow_symlinks in extract feature\n- switch to obs_scm for this package\n- run download_files in appimage and snapcraft case\n- check --extract file path for parent dir\n- Fix parameter descriptions\n- changed os.removedirs -\u003e shutil.rmtree\n- Adding information regarding the *package-metadata* option for the *tar* service The tar service is highly useful in combination with the *obscpio* service. After the fix for the metadata for the latter one, it is important to inform the users of the *tar* service that metadata is kept only if the flag *package-metadata* is enabled. Add the flag to the .service file for mentioning that.\n- Allow metadata packing for CPIO archives when desired As of now, metadata are always excluded from *obscpio* packages. This is because the *package-metadata* flag is ignored; this change (should) make *obscpio* aware of it.\n- improve handling of corrupt git cache directories\n- only do git stash save/pop if we have a non-empty working tree (#228)\n- don\u0027t allow DEBUG_TAR_SCM to change behaviour (#240)\n- add stub user docs in lieu of something proper (#238)\n- Remove clone_dir if clone fails\n- python-unittest2 is only required for the optional make check\n- move python-unittest2 dep to test suite only part (submission by olh)\n- Removing redundant pass statement\n- missing import for logging functions.\n- [backend] Adding http proxy support\n- python-unittest2 is only required for the optional make check\n- make installation of scm\u0027s optional\n- add a lot more detail to README\n- Git clone with --no-checkout in prepare_working_copy\n- Refactor and simplify git prepare_working_copy\n- Only use current dir if it actually looks like git (Fixes #202)\n- reactivate test_obscpio_extract_d\n- fix broken test create_archive\n- fix broken tests for broken-links\n- changed PREFIX in Gnumakefile to /usr\n- new cli option --skip-cleanup\n- fix for broken links\n- fix reference to snapcraft YAML file\n- fix docstring typo in TarSCM.scm.tar.fetch_upstream\n- acknowledge deficiencies in dev docs\n- wrap long lines in README\n\nThis update was imported from the SUSE:SLE-15:Update update project.\nThis update was imported from the openSUSE:Leap:15.0:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-329", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0329-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:0329-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKGGMO3NGZX2ZLQDMAHVVJX4HZMC2X3E/#SKGGMO3NGZX2ZLQDMAHVVJX4HZMC2X3E" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:0329-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKGGMO3NGZX2ZLQDMAHVVJX4HZMC2X3E/#SKGGMO3NGZX2ZLQDMAHVVJX4HZMC2X3E" }, { "category": "self", "summary": "SUSE Bug 1076410", "url": "https://bugzilla.suse.com/1076410" }, { "category": "self", "summary": "SUSE Bug 1082696", "url": "https://bugzilla.suse.com/1082696" }, { "category": "self", "summary": "SUSE Bug 1105361", "url": "https://bugzilla.suse.com/1105361" }, { "category": "self", "summary": "SUSE Bug 1107507", "url": "https://bugzilla.suse.com/1107507" }, { "category": "self", "summary": "SUSE Bug 1107944", "url": "https://bugzilla.suse.com/1107944" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12473 page", "url": "https://www.suse.com/security/cve/CVE-2018-12473/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12474 page", "url": "https://www.suse.com/security/cve/CVE-2018-12474/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12476 page", "url": "https://www.suse.com/security/cve/CVE-2018-12476/" } ], "title": "Security update for obs-service-tar_scm", "tracking": { "current_release_date": "2019-03-15T06:52:27Z", "generator": { "date": "2019-03-15T06:52:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:0329-1", "initial_release_date": "2019-03-15T06:52:27Z", "revision_history": [ { "date": "2019-03-15T06:52:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product": { "name": "obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product_id": "obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product": { "name": "obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product_id": "obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product": { "name": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product_id": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product": { "name": "obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product_id": "obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product": { "name": "obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product_id": "obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" } }, { "category": "product_version", "name": "obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product": { "name": "obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "product_id": "obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15", "product": { "name": "SUSE Package Hub 15", "product_id": "SUSE Package Hub 15" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" }, "product_reference": "obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" }, "product_reference": "obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" }, "product_reference": "obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" }, "product_reference": "obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" }, "product_reference": "obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" }, "product_reference": "obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12473", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12473" } ], "notes": [ { "category": "general", "text": "A path traversal traversal vulnerability in obs-service-tar_scm of Open Build Service allows remote attackers to cause access files not in the current build. On the server itself this is prevented by confining the worker via KVM. Affected releases are openSUSE Open Build Service: versions prior to 70d1aa4cc4d7b940180553a63805c22fc62e2cf0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12473", "url": "https://www.suse.com/security/cve/CVE-2018-12473" }, { "category": "external", "summary": "SUSE Bug 1105361 for CVE-2018-12473", "url": "https://bugzilla.suse.com/1105361" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-15T06:52:27Z", "details": "important" } ], "title": "CVE-2018-12473" }, { "cve": "CVE-2018-12474", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12474" } ], "notes": [ { "category": "general", "text": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12474", "url": "https://www.suse.com/security/cve/CVE-2018-12474" }, { "category": "external", "summary": "SUSE Bug 1107507 for CVE-2018-12474", "url": "https://bugzilla.suse.com/1107507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-15T06:52:27Z", "details": "critical" } ], "title": "CVE-2018-12474" }, { "cve": "CVE-2018-12476", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12476" } ], "notes": [ { "category": "general", "text": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12476", "url": "https://www.suse.com/security/cve/CVE-2018-12476" }, { "category": "external", "summary": "SUSE Bug 1107944 for CVE-2018-12476", "url": "https://bugzilla.suse.com/1107944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15:obs-service-appimage-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-obs_scm-common-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-snapcraft-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch", "SUSE Package Hub 15:obs-service-tar_scm-0.10.5.1551309990.79898c7-bp150.3.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-15T06:52:27Z", "details": "important" } ], "title": "CVE-2018-12476" } ] }
opensuse-su-2024:11107-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11107", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11107-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12473 page", "url": "https://www.suse.com/security/cve/CVE-2018-12473/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12474 page", "url": "https://www.suse.com/security/cve/CVE-2018-12474/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12476 page", "url": "https://www.suse.com/security/cve/CVE-2018-12476/" } ], "title": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11107-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "product": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "product_id": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64" } }, { "category": "product_version", "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "product": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "product_id": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64" } }, { "category": "product_version", "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "product": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "product_id": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64" } }, { "category": "product_version", "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "product": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "product_id": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64" } }, { "category": "product_version", "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "product": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "product_id": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64" } }, { "category": "product_version", "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "product": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "product_id": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product_id": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le" } }, { "category": "product_version", "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product_id": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le" } }, { "category": "product_version", "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product_id": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le" } }, { "category": "product_version", "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product_id": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le" } }, { "category": "product_version", "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product_id": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le" } }, { "category": "product_version", "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "product_id": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "product": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "product_id": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x" } }, { "category": "product_version", "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "product": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "product_id": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x" } }, { "category": "product_version", "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "product": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "product_id": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x" } }, { "category": "product_version", "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "product": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "product_id": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x" } }, { "category": "product_version", "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "product": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "product_id": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x" } }, { "category": "product_version", "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "product": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "product_id": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "product": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "product_id": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64" } }, { "category": "product_version", "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "product": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "product_id": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" } }, { "category": "product_version", "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "product": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "product_id": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64" } }, { "category": "product_version", "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "product": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "product_id": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64" } }, { "category": "product_version", "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "product": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "product_id": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64" } }, { "category": "product_version", "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "product": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "product_id": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64" }, "product_reference": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le" }, "product_reference": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x" }, "product_reference": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64" }, "product_reference": "obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64" }, "product_reference": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le" }, "product_reference": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x" }, "product_reference": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" }, "product_reference": "obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64" }, "product_reference": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le" }, "product_reference": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x" }, "product_reference": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64" }, "product_reference": "obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64" }, "product_reference": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le" }, "product_reference": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x" }, "product_reference": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64" }, "product_reference": "obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64" }, "product_reference": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le" }, "product_reference": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x" }, "product_reference": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64" }, "product_reference": "obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64" }, "product_reference": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le" }, "product_reference": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x" }, "product_reference": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" }, "product_reference": "obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12473", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12473" } ], "notes": [ { "category": "general", "text": "A path traversal traversal vulnerability in obs-service-tar_scm of Open Build Service allows remote attackers to cause access files not in the current build. On the server itself this is prevented by confining the worker via KVM. Affected releases are openSUSE Open Build Service: versions prior to 70d1aa4cc4d7b940180553a63805c22fc62e2cf0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12473", "url": "https://www.suse.com/security/cve/CVE-2018-12473" }, { "category": "external", "summary": "SUSE Bug 1105361 for CVE-2018-12473", "url": "https://bugzilla.suse.com/1105361" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12473" }, { "cve": "CVE-2018-12474", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12474" } ], "notes": [ { "category": "general", "text": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12474", "url": "https://www.suse.com/security/cve/CVE-2018-12474" }, { "category": "external", "summary": "SUSE Bug 1107507 for CVE-2018-12474", "url": "https://bugzilla.suse.com/1107507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-12474" }, { "cve": "CVE-2018-12476", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12476" } ], "notes": [ { "category": "general", "text": "Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12476", "url": "https://www.suse.com/security/cve/CVE-2018-12476" }, { "category": "external", "summary": "SUSE Bug 1107944 for CVE-2018-12476", "url": "https://bugzilla.suse.com/1107944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1.x86_64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.aarch64", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.ppc64le", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.s390x", "openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12476" } ] }
fkie_cve-2018-12474
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:tar_scm:*:*:*:*:*:*:*:*", "matchCriteriaId": "0076F11D-90A0-41F2-836B-B5A08EF34927", "versionEndExcluding": "0.9.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106." }, { "lang": "es", "value": "Validaci\u00f3n de entradas incorrecta en obs-service-tar_scm en Open Build Service permite que los atacantes remotos puedaqn acceder y extraer informaci\u00f3n fuera de la build actual o crear archivos en ubicaciones controladas por el atacante. Las versiones afectadas son openSUSE Open Build Service en versiones anteriores a la 51a17c553b6ae2598820b7a90fd0c11502a49106." } ], "id": "CVE-2018-12474", "lastModified": "2024-11-21T03:45:17.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "security@opentext.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-09T13:29:00.400", "references": [ { "source": "security@opentext.com", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107507" }, { "source": "security@opentext.com", "url": "https://github.com/openSUSE/obs-service-tar_scm/pull/254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/openSUSE/obs-service-tar_scm/pull/254" } ], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security@opentext.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2018-12474
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-12474", "description": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.", "id": "GSD-2018-12474", "references": [ "https://www.suse.com/security/cve/CVE-2018-12474.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-12474" ], "details": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.", "id": "GSD-2018-12474", "modified": "2023-12-13T01:22:30.060858Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-09-26T00:00:00.000Z", "ID": "CVE-2018-12474", "STATE": "PUBLIC", "TITLE": "Crafted service parameters allows to induce unexpected behaviour in obs-service-tar_scm" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Open Build Service", "version": { "version_data": [ { "affected": "\u003c", "version_value": "51a17c553b6ae2598820b7a90fd0c11502a49106" } ] } } ] }, "vendor_name": "openSUSE" } ] } }, "credit": [ { "lang": "eng", "value": "Matthias Gerstner of SUSE" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/openSUSE/obs-service-tar_scm/pull/254", "refsource": "CONFIRM", "url": "https://github.com/openSUSE/obs-service-tar_scm/pull/254" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1107507", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107507" } ] }, "source": { "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1107507", "defect": [ "https://bugzilla.suse.com/show_bug.cgi?id=1107507" ], "discovery": "INTERNAL" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:tar_scm:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.9.3", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@suse.com", "ID": "CVE-2018-12474" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/openSUSE/obs-service-tar_scm/pull/254", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://github.com/openSUSE/obs-service-tar_scm/pull/254" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1107507", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107507" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2019-10-09T23:34Z", "publishedDate": "2018-10-09T13:29Z" } } }
cnvd-2018-26001
Vulnerability from cnvd
Title: Open Build Service输入验证漏洞
Description:
Open Build Service(OBS)是一套通用的、以自动、一致和可重复的方式从源代码构建和分发软件包的系统。
Open Build Service 51a17c553b6ae2598820b7a90fd0c11502a49106之前版本中的obs-service-tar_scm存在输入验证漏洞。远程攻击者可利用该漏洞访问并提取信息,或在攻击者控制的位置创建文件。
Severity: 中
Patch Name: Open Build Service输入验证漏洞的补丁
Patch Description:
Open Build Service(OBS)是一套通用的、以自动、一致和可重复的方式从源代码构建和分发软件包的系统。
Open Build Service 51a17c553b6ae2598820b7a90fd0c11502a49106之前版本中的obs-service-tar_scm存在输入验证漏洞。远程攻击者可利用该漏洞访问并提取信息,或在攻击者控制的位置创建文件。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/openSUSE/obs-service-tar_scm/pull/254
Reference: https://nvd.nist.gov/vuln/detail/CVE-2018-12474
Name | open build service open build service <51a17c553b6ae2598820b7a90fd0c11502a49106 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2018-12474", "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12474" } }, "description": "Open Build Service\uff08OBS\uff09\u662f\u4e00\u5957\u901a\u7528\u7684\u3001\u4ee5\u81ea\u52a8\u3001\u4e00\u81f4\u548c\u53ef\u91cd\u590d\u7684\u65b9\u5f0f\u4ece\u6e90\u4ee3\u7801\u6784\u5efa\u548c\u5206\u53d1\u8f6f\u4ef6\u5305\u7684\u7cfb\u7edf\u3002\n\nOpen Build Service 51a17c553b6ae2598820b7a90fd0c11502a49106\u4e4b\u524d\u7248\u672c\u4e2d\u7684obs-service-tar_scm\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8bbf\u95ee\u5e76\u63d0\u53d6\u4fe1\u606f\uff0c\u6216\u5728\u653b\u51fb\u8005\u63a7\u5236\u7684\u4f4d\u7f6e\u521b\u5efa\u6587\u4ef6\u3002", "discovererName": "Matthias Gerstner", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/openSUSE/obs-service-tar_scm/pull/254", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-26001", "openTime": "2018-12-20", "patchDescription": "Open Build Service\uff08OBS\uff09\u662f\u4e00\u5957\u901a\u7528\u7684\u3001\u4ee5\u81ea\u52a8\u3001\u4e00\u81f4\u548c\u53ef\u91cd\u590d\u7684\u65b9\u5f0f\u4ece\u6e90\u4ee3\u7801\u6784\u5efa\u548c\u5206\u53d1\u8f6f\u4ef6\u5305\u7684\u7cfb\u7edf\u3002\r\n\r\nOpen Build Service 51a17c553b6ae2598820b7a90fd0c11502a49106\u4e4b\u524d\u7248\u672c\u4e2d\u7684obs-service-tar_scm\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8bbf\u95ee\u5e76\u63d0\u53d6\u4fe1\u606f\uff0c\u6216\u5728\u653b\u51fb\u8005\u63a7\u5236\u7684\u4f4d\u7f6e\u521b\u5efa\u6587\u4ef6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Open Build Service\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "open build service open build service \u003c51a17c553b6ae2598820b7a90fd0c11502a49106" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-12474", "serverity": "\u4e2d", "submitTime": "2018-10-30", "title": "Open Build Service\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e" }
ghsa-2g8g-ghh7-j7r3
Vulnerability from github
Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.
{ "affected": [], "aliases": [ "CVE-2018-12474" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-10-09T13:29:00Z", "severity": "CRITICAL" }, "details": "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.", "id": "GHSA-2g8g-ghh7-j7r3", "modified": "2022-05-13T01:34:46Z", "published": "2022-05-13T01:34:46Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12474" }, { "type": "WEB", "url": "https://github.com/openSUSE/obs-service-tar_scm/pull/254" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1107507" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.