Discover Government News

   SUSE Security Update: Fixing security issues on OBS toolchain
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:0065-1
Rating:             important
References:         #1059858 #1069904 #796918 #827480 #891829 
                    #938556 #967265 #967610 
Cross-References:   CVE-2016-4007 CVE-2017-14804 CVE-2017-9274
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
______________________________________________________________________________

   An update that solves three vulnerabilities and has 5 fixes
   is now available.

Description:

   This OBS toolchain update fixes the following issues:

   Package 'build':

   - CVE-2017-14804: Improve file name check extractbuild (bsc#1069904)
   - Fixed Dockerfile repository parsing

   Package 'obs-service-source_validator':

   - CVE-2017-9274: Don't use rpmbuild to extract sources, patches etc. from
     a spec (bnc#938556).
   - CVE-2016-4007: Several maintained source services are vulnerable to
     code/paramter injection (bsc#967265)
   - Update to version 0.7.
   - Use spec_query instead of output_versions using the specfile parser from
     the build package (boo#1059858)
   - obs-service-source_validator: several occurrences of uninitialized value
     (bsc#967610)
   - hack for util-linux specfiles (bnc#891829)
   - fix dependency to gnupg2 for Fedora (bnc#827480)
   - exit if tmpdir creation fails (bnc#796918)


   Package 'osc':

   - Update to version 0.162.0.


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-build-13404=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      osc-0.162.1-7.4.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (noarch):

      build-20171128-8.3.3


References:

   https://www.suse.com/security/cve/CVE-2016-4007.html
   https://www.suse.com/security/cve/CVE-2017-14804.html
   https://www.suse.com/security/cve/CVE-2017-9274.html
   https://bugzilla.suse.com/1059858
   https://bugzilla.suse.com/1069904
   https://bugzilla.suse.com/796918
   https://bugzilla.suse.com/827480
   https://bugzilla.suse.com/891829
   https://bugzilla.suse.com/938556
   https://bugzilla.suse.com/967265
   https://bugzilla.suse.com/967610

-- 

SUSE: 2018:0065-1: important: Fixing security issues on OBS toolchain

January 11, 2018
An update that solves three vulnerabilities and has 5 fixes is now available.

Summary

This OBS toolchain update fixes the following issues: Package 'build': - CVE-2017-14804: Improve file name check extractbuild (bsc#1069904) - Fixed Dockerfile repository parsing Package 'obs-service-source_validator': - CVE-2017-9274: Don't use rpmbuild to extract sources, patches etc. from a spec (bnc#938556). - CVE-2016-4007: Several maintained source services are vulnerable to code/paramter injection (bsc#967265) - Update to version 0.7. - Use spec_query instead of output_versions using the specfile parser from the build package (boo#1059858) - obs-service-source_validator: several occurrences of uninitialized value (bsc#967610) - hack for util-linux specfiles (bnc#891829) - fix dependency to gnupg2 for Fedora (bnc#827480) - exit if tmpdir creation fails (bnc#796918) Package 'osc': - Update to version 0.162.0. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-build-13404=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): osc-0.162.1-7.4.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (noarch): build-20171128-8.3.3

References

#1059858 #1069904 #796918 #827480 #891829

#938556 #967265 #967610

Cross- CVE-2016-4007 CVE-2017-14804 CVE-2017-9274

Affected Products:

SUSE Linux Enterprise Software Development Kit 11-SP4

https://www.suse.com/security/cve/CVE-2016-4007.html

https://www.suse.com/security/cve/CVE-2017-14804.html

https://www.suse.com/security/cve/CVE-2017-9274.html

https://bugzilla.suse.com/1059858

https://bugzilla.suse.com/1069904

https://bugzilla.suse.com/796918

https://bugzilla.suse.com/827480

https://bugzilla.suse.com/891829

https://bugzilla.suse.com/938556

https://bugzilla.suse.com/967265

https://bugzilla.suse.com/967610

--

Severity
Announcement ID: SUSE-SU-2018:0065-1
Rating: important

Related News