First published: Tue Feb 28 2012(Updated: )
A security flaw was found in the way osc, the Python language based command line client for the openSUSE build service, displayed build logs and build status for particular build. A rogue repository server could use this flaw to modify window's title, or possibly execute arbitrary commands or overwrite files via a specially-crafted build log or build status output containing an escape sequence for a terminal emulator. References: [1] <a href="https://bugzilla.novell.com/show_bug.cgi?id=749335">https://bugzilla.novell.com/show_bug.cgi?id=749335</a>
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE osc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-798353 is considered moderate due to potential arbitrary command execution.
To fix REDHAT-BUG-798353, ensure that you are running the latest version of the openSUSE osc client.
Systems using the openSUSE osc client are affected by REDHAT-BUG-798353.
A rogue repository server could exploit REDHAT-BUG-798353 to modify window titles or execute arbitrary commands.
Currently, the best practice is to regularly update the openSUSE osc client to mitigate risks associated with REDHAT-BUG-798353.