SUSE Security Update: Fixing security issues on OBS toolchain
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0065-1
Rating: important
References: #1059858 #1069904 #796918 #827480 #891829
#938556 #967265 #967610
Cross-References: CVE-2016-4007 CVE-2017-14804 CVE-2017-9274
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
______________________________________________________________________________
An update that solves three vulnerabilities and has 5 fixes
is now available.
Description:
This OBS toolchain update fixes the following issues:
Package ‘build’:
– CVE-2017-14804: Improve file name check extractbuild (bsc#1069904)
– Fixed Dockerfile repository parsing
Package ‘obs-service-source_validator’:
– CVE-2017-9274: Don’t use rpmbuild to extract sources, patches etc. from
a spec (bnc#938556).
– CVE-2016-4007: Several maintained source services are vulnerable to
code/paramter injection (bsc#967265)
– Update to version 0.7.
– Use spec_query instead of output_versions using the specfile parser from
the build package (boo#1059858)
– obs-service-source_validator: several occurrences of uninitialized value
(bsc#967610)
– hack for util-linux specfiles (bnc#891829)
– fix dependency to gnupg2 for Fedora (bnc#827480)
– exit if tmpdir creation fails (bnc#796918)
Package ‘osc’:
– Update to version 0.162.0.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-build-13404=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
osc-0.162.1-7.4.1
– SUSE Linux Enterprise Software Development Kit 11-SP4 (noarch):
build-20171128-8.3.3
References:
https://www.suse.com/security/cve/CVE-2016-4007.html
https://www.suse.com/security/cve/CVE-2017-14804.html
https://www.suse.com/security/cve/CVE-2017-9274.html
https://bugzilla.suse.com/1059858
https://bugzilla.suse.com/1069904
https://bugzilla.suse.com/796918
https://bugzilla.suse.com/827480
https://bugzilla.suse.com/891829
https://bugzilla.suse.com/938556
https://bugzilla.suse.com/967265
https://bugzilla.suse.com/967610
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org