openSUSE Security Update : python3-rpm / rpm / rpm-python (openSUSE-SU-2014:1716-1)

critical Nessus Plugin ID 80276

Synopsis

The remote openSUSE host is missing a security update.

Description

This rpm update fixes the following security and non security issues :

- honor --noglob in install mode [bnc#892431]

- check for bad invalid name sizes [bnc#908128] [CVE-2014-8118]

- create files with mode 0 [bnc#906803] [CVE-2013-6435]

This update also includes version updates of rpm-python and python3-rpm.

Solution

Update the affected python3-rpm / rpm / rpm-python packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=892431

https://bugzilla.opensuse.org/show_bug.cgi?id=906803

https://bugzilla.opensuse.org/show_bug.cgi?id=908128

https://lists.opensuse.org/opensuse-updates/2014-12/msg00100.html

Plugin Details

Severity: Critical

ID: 80276

File Name: openSUSE-2014-816.nasl

Version: 1.4

Type: local

Agent: unix

Published: 12/29/2014

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:python3-rpm, p-cpe:/a:novell:opensuse:python3-rpm-debuginfo, p-cpe:/a:novell:opensuse:python3-rpm-debugsource, p-cpe:/a:novell:opensuse:rpm, p-cpe:/a:novell:opensuse:rpm-32bit, p-cpe:/a:novell:opensuse:rpm-build, p-cpe:/a:novell:opensuse:rpm-build-debuginfo, p-cpe:/a:novell:opensuse:rpm-debuginfo, p-cpe:/a:novell:opensuse:rpm-debuginfo-32bit, p-cpe:/a:novell:opensuse:rpm-debugsource, p-cpe:/a:novell:opensuse:rpm-devel, p-cpe:/a:novell:opensuse:rpm-python, p-cpe:/a:novell:opensuse:rpm-python-debuginfo, p-cpe:/a:novell:opensuse:rpm-python-debugsource, cpe:/o:novell:opensuse:12.3, cpe:/o:novell:opensuse:13.1, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 12/18/2014

Reference Information

CVE: CVE-2013-6435, CVE-2014-8118