Bug 1220347 (CVE-2024-27318)

Summary: VUL-0: CVE-2024-27318: python-onnx: path sanitization bypass leads to arbitrary file read
Product: [openSUSE] openSUSE Distribution Reporter: SMASH SMASH <smash_bz>
Component: SecurityAssignee: Guillaume GARDET <guillaume.gardet>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: carlos.lopez
Version: Leap 15.6   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/395000/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-02-26 11:07:43 UTC
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerability occurs as a bypass for the patch added for CVE-2022-25882.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-27318
https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479
https://www.cve.org/CVERecord?id=CVE-2024-27318
https://github.com/onnx/onnx/commit/66b7fb630903fdcf3e83b6b6d56d82e904264a20
https://bugzilla.redhat.com/show_bug.cgi?id=2265737