SUSE: 2018:0065-1: important: Fixing security issues on OBS toolchain
Summary
This OBS toolchain update fixes the following issues: Package 'build': - CVE-2017-14804: Improve file name check extractbuild (bsc#1069904) - Fixed Dockerfile repository parsing Package 'obs-service-source_validator': - CVE-2017-9274: Don't use rpmbuild to extract sources, patches etc. from a spec (bnc#938556). - CVE-2016-4007: Several maintained source services are vulnerable to code/paramter injection (bsc#967265) - Update to version 0.7. - Use spec_query instead of output_versions using the specfile parser from the build package (boo#1059858) - obs-service-source_validator: several occurrences of uninitialized value (bsc#967610) - hack for util-linux specfiles (bnc#891829) - fix dependency to gnupg2 for Fedora (bnc#827480) - exit if tmpdir creation fails (bnc#796918) Package 'osc': - Update to version 0.162.0. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-build-13404=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): osc-0.162.1-7.4.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (noarch): build-20171128-8.3.3
References
#1059858 #1069904 #796918 #827480 #891829
#938556 #967265 #967610
Cross- CVE-2016-4007 CVE-2017-14804 CVE-2017-9274
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
https://www.suse.com/security/cve/CVE-2016-4007.html
https://www.suse.com/security/cve/CVE-2017-14804.html
https://www.suse.com/security/cve/CVE-2017-9274.html
https://bugzilla.suse.com/1059858
https://bugzilla.suse.com/1069904
https://bugzilla.suse.com/796918
https://bugzilla.suse.com/827480
https://bugzilla.suse.com/891829
https://bugzilla.suse.com/938556
https://bugzilla.suse.com/967265
https://bugzilla.suse.com/967610
--