Bug 1219901 (CVE-2022-48624) - VUL-0: CVE-2022-48624: less: LESSCLOSE handling in less does not quote shell metacharacters
Summary: VUL-0: CVE-2022-48624: less: LESSCLOSE handling in less does not quote shell ...
Status: IN_PROGRESS
Alias: CVE-2022-48624
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: x86-64 Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/394016/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-48624:7.8:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-02-14 07:23 UTC by Markus Meisters
Modified: 2024-04-19 09:15 UTC (History)
7 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Matthias Gerstner 2024-02-14 09:50:40 UTC
This only affects SLE-15-SP4 (and likely older codestreams).

The issue is not in the scripts provided by us but in the handling of these
scripts in less itself. The issue was fixed upstream without tagging it as
security:

https://github.com/gwsw/less/commit/c6ac6de49698be84d264a0c4c0c40bb870b10144
Comment 4 Matthias Gerstner 2024-02-14 11:24:48 UTC
(In reply to mmeisters@suse.com from comment #3)
> (In reply to Matthias Gerstner from comment #1)
> > This only affects SLE-15-SP4 (and likely older codestreams).
> > 
> > The issue is not in the scripts provided by us but in the handling of these
> > scripts in less itself. The issue was fixed upstream without tagging it as
> > security:
> > 
> > https://github.com/gwsw/less/commit/c6ac6de49698be84d264a0c4c0c40bb870b10144
> 
> I tested this on SP5 thought:
> 
> sles15sp5:~ # cat /etc/os-release 
> NAME="SLES"
> VERSION="15-SP5"

I meant to refer to the _codestream_ and SLE-15-SP4 is the newest codestream
for `less`. Sorry if this caused any confusion.
Comment 6 Thomas Leroy 2024-02-19 09:32:58 UTC
public:

https://nvd.nist.gov/vuln/detail/CVE-2022-48624
Comment 7 Thomas Leroy 2024-02-19 10:54:43 UTC
Other affected codestreams:

- SUSE:SLE-11:Update
- SUSE:SLE-12:Update
- SUSE:SLE-15-SP4:Update
- SUSE:SLE-15:Update

ALP already fixed.
Comment 10 Maintenance Automation 2024-04-10 08:33:24 UTC
SUSE-SU-2024:1192-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1219901
CVE References: CVE-2022-48624
Maintenance Incident: [SUSE:Maintenance:33169](https://smelt.suse.de/incident/33169/)
Sources used:
openSUSE Leap 15.4 (src):
 less-590-150400.3.6.2
openSUSE Leap Micro 5.3 (src):
 less-590-150400.3.6.2
openSUSE Leap Micro 5.4 (src):
 less-590-150400.3.6.2
openSUSE Leap 15.5 (src):
 less-590-150400.3.6.2
SUSE Linux Enterprise Micro for Rancher 5.3 (src):
 less-590-150400.3.6.2
SUSE Linux Enterprise Micro 5.3 (src):
 less-590-150400.3.6.2
SUSE Linux Enterprise Micro for Rancher 5.4 (src):
 less-590-150400.3.6.2
SUSE Linux Enterprise Micro 5.4 (src):
 less-590-150400.3.6.2
SUSE Linux Enterprise Micro 5.5 (src):
 less-590-150400.3.6.2
Basesystem Module 15-SP5 (src):
 less-590-150400.3.6.2
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 less-590-150400.3.6.2
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 less-590-150400.3.6.2
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 less-590-150400.3.6.2
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 less-590-150400.3.6.2
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 less-590-150400.3.6.2
SUSE Manager Proxy 4.3 (src):
 less-590-150400.3.6.2
SUSE Manager Retail Branch Server 4.3 (src):
 less-590-150400.3.6.2
SUSE Manager Server 4.3 (src):
 less-590-150400.3.6.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Maintenance Automation 2024-04-10 08:33:29 UTC
SUSE-SU-2024:1190-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1219901
CVE References: CVE-2022-48624
Maintenance Incident: [SUSE:Maintenance:33168](https://smelt.suse.de/incident/33168/)
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src):
 less-530-150000.3.6.2
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src):
 less-530-150000.3.6.2
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src):
 less-530-150000.3.6.2
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src):
 less-530-150000.3.6.2
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src):
 less-530-150000.3.6.2
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src):
 less-530-150000.3.6.2
SUSE Enterprise Storage 7.1 (src):
 less-530-150000.3.6.2
SUSE Linux Enterprise Micro 5.1 (src):
 less-530-150000.3.6.2
SUSE Linux Enterprise Micro 5.2 (src):
 less-530-150000.3.6.2
SUSE Linux Enterprise Micro for Rancher 5.2 (src):
 less-530-150000.3.6.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Maintenance Automation 2024-04-10 08:33:31 UTC
SUSE-SU-2024:1189-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1219901
CVE References: CVE-2022-48624
Maintenance Incident: [SUSE:Maintenance:33176](https://smelt.suse.de/incident/33176/)
Sources used:
SUSE Linux Enterprise Server 12 SP5 (src):
 less-458-7.12.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 less-458-7.12.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 less-458-7.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.