Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:1361412562310833210
HistoryMar 04, 2024 - 12:00 a.m.

openSUSE: Security Advisory for yt (openSUSE-SU-2023:0374-1)

2024-03-0400:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
3
opensuse
security advisory
yt-dlp
cve-2023-46121
cve-2023-35934
patch
python
http
subtitles
vulnerability
update
release

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N

6.1 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

47.7%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.833210");
  script_version("2024-05-16T05:05:35+0000");
  script_cve_id("CVE-2023-35934", "CVE-2023-46121");
  script_tag(name:"cvss_base", value:"8.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:P/A:N");
  script_tag(name:"last_modification", value:"2024-05-16 05:05:35 +0000 (Thu, 16 May 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-07-13 19:22:29 +0000 (Thu, 13 Jul 2023)");
  script_tag(name:"creation_date", value:"2024-03-04 07:41:09 +0000 (Mon, 04 Mar 2024)");
  script_name("openSUSE: Security Advisory for yt (openSUSE-SU-2023:0374-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("SuSE Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/suse", "ssh/login/rpms", re:"ssh/login/release=openSUSEBackportsSLE-15-SP5");

  script_xref(name:"Advisory-ID", value:"openSUSE-SU-2023:0374-1");
  script_xref(name:"URL", value:"https://lists.opensuse.org/archives/list/[email protected]/thread/6MA5EHVFVH4HRBQQ5KZZ4YVOXJFQUG3W");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'yt'
  package(s) announced via the openSUSE-SU-2023:0374-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"This update for yt-dlp fixes the following issues:

  - Update to release 2023.11.14

  * Security: [CVE-2023-46121] Patch Generic Extractor MITM Vulnerability
         via Arbitrary Proxy Injection

  * Disallow smuggling of arbitrary http_headers  extractors now
         only use specific headers

  - Make yt-dlp require the one pythonXX-yt-dlp that /usr/bin/yt-dlp was
       built with.

  - Rework Python build procedure [boo#1216467]

  - Enable Python library [boo#1216467]

  - Update to release 2023.10.13

  * youtube: fix some bug with --extractor-retries inf

  - Update to release 2023.10.07

  * yt: Fix heatmap extraction

  * yt: Raise a warning for Incomplete Data instead of an error

  - Update to release 2023.09.24

  * Extract subtitles from SMIL manifests

  * fb: Add dash manifest URL

  * crunchyroll: Remove initial state extraction

  * youtube: Add player_params extractor arg

  - remove suggests on brotlicffi - this is only for != cpython

  - Update to release 2023.07.06

  * Prevent Cookie leaks on HTTP redirect [boo#1213124] [CVE-2023-35934]

  * yt: Avoid false DRM detection

  * yt: Process post_live over 2 hours

  * yt: Support shorts-only playlists

  - Update to release 2023.06.22

  * youtube: add IOS to default clients used

  - Update to release 2023.06.21

  * Add option --compat-option playlist-match-filter

  * Add options --no-quiet, option --color, --netrc-cmd, --xff

  * Auto-select default format in -f-

  * Improve HTTP redirect handling

  * Support decoding multiple content encodings

  - Use python3.11 on Leap 15.5

  * python3.11 is the only python3   3.6 version would be shipped in Leap
         15.5

  - Update to release 2023.03.04

  * A bunch of extractor fixes

  - Update to release 2023.03.03

  * youtube: Construct dash formats with range query

  * yt: Detect and break on looping comments

  * yt: Extract channel view_count when /about tab is passed

  - Update to release 2023.02.17

  * Merge youtube-dl: Upto commit/2dd6c6e (Feb 17 2023)

  * Fix --concat-playlist

  * Imply --no-progress when --print

  * Improve default subtitle language selection

  * Make title completely non-fatal

  * Sanitize formats before sorting

  * [hls] Allow extractors to provide AES key

  * [extractor/generic] Avoid catastrophic backtracking in KVS regex

  * [jsinterp] Support if statements

  * [plugins] Fix zip search paths

  * [utils] Don't use  ...

  Description truncated. Please see the references for more information.");

  script_tag(name:"affected", value:"'yt' package(s) on openSUSE Backports SLE-15-SP5.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "openSUSEBackportsSLE-15-SP5") {

  if(!isnull(res = isrpmvuln(pkg:"python311-yt-dlp", rpm:"python311-yt-dlp~2023.11.14~bp155.3.3.1", rls:"openSUSEBackportsSLE-15-SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"yt-dlp", rpm:"yt-dlp~2023.11.14~bp155.3.3.1", rls:"openSUSEBackportsSLE-15-SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"yt-dlp-bash-completion", rpm:"yt-dlp-bash-completion~2023.11.14~bp155.3.3.1", rls:"openSUSEBackportsSLE-15-SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"yt-dlp-fish-completion", rpm:"yt-dlp-fish-completion~2023.11.14~bp155.3.3.1", rls:"openSUSEBackportsSLE-15-SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"yt-dlp-zsh-completion", rpm:"yt-dlp-zsh-completion~2023.11.14~bp155.3.3.1", rls:"openSUSEBackportsSLE-15-SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"python311-yt-dlp", rpm:"python311-yt-dlp~2023.11.14~bp155.3.3.1", rls:"openSUSEBackportsSLE-15-SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"yt-dlp", rpm:"yt-dlp~2023.11.14~bp155.3.3.1", rls:"openSUSEBackportsSLE-15-SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"yt-dlp-bash-completion", rpm:"yt-dlp-bash-completion~2023.11.14~bp155.3.3.1", rls:"openSUSEBackportsSLE-15-SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"yt-dlp-fish-completion", rpm:"yt-dlp-fish-completion~2023.11.14~bp155.3.3.1", rls:"openSUSEBackportsSLE-15-SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"yt-dlp-zsh-completion", rpm:"yt-dlp-zsh-completion~2023.11.14~bp155.3.3.1", rls:"openSUSEBackportsSLE-15-SP5"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N

6.1 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

47.7%