Bug 1220157 (CVE-2024-25711)

Summary: VUL-0: CVE-2024-25711: diffoscope: information disclosure vulnerability when diffing GPG artifacts
Product: [openSUSE] openSUSE Distribution Reporter: SMASH SMASH <smash_bz>
Component: OtherAssignee: Sebastian Wagner <sebix+novell.com>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: andrea.mattiazzo
Version: Leap 15.6   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/394486/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-02-21 15:06:46 UTC
Use a determistic name when extracting content from GPG
  artifacts instead of trusting the value of gpg's --use-embedded-filenames.

  This prevents a potential information disclosure vulnerability that could
  have been exploited by providing a specially-crafted GPG file with an
  embedded filename of, say, "../../.ssh/id_rsa".

  Many thanks to Daniel Kahn Gillmor <dkg@debian.org> for reporting this
  issue and providing feedback.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-25711
https://bugzilla.redhat.com/show_bug.cgi?id=2264735
https://salsa.debian.org/reproducible-builds/diffoscope/-/issues/361

Patch:
https://salsa.debian.org/reproducible-builds/diffoscope/-/commit/458f7f04bc053a0066aa7d2fd3251747d4899476
Comment 1 Andrea Mattiazzo 2024-02-21 15:08:08 UTC
Tracking as affected:
- openSUSE:Backports:SLE-15-SP5/diffoscope  85 
- openSUSE:Factory/diffoscope               251

CVE fixed in version 256 (https://diffoscope.org/news/diffoscope-256-released/)
Comment 2 OBSbugzilla Bot 2024-03-24 19:35:03 UTC
This is an autogenerated message for OBS integration:
This bug (1220157) was mentioned in
https://build.opensuse.org/request/show/1161156 Factory / diffoscope