<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libzypp, zypper</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:2739-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-09-17T05:31:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-09-17T05:31:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-09-17T05:31:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libzypp, zypper</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libzypp, zypper, libsolv provides the following fixes:

Security fixes in libzypp:

- CVE-2018-7685: PackageProvider: Validate RPMs before caching (bsc#1091624, bsc#1088705)
- CVE-2017-9269: Be sure bad packages do not stay in the cache (bsc#1045735)

Changes in libzypp:

- Update to version 17.6.4
- Automatically fetch repository signing key from gpgkey url (bsc#1088037)
- lsof: use '-K i' if lsof supports it (bsc#1099847,bsc#1036304)
- Check for not imported keys after multi key import from rpmdb (bsc#1096217)
- Flags: make it std=c++14 ready
- Ignore /var, /tmp and /proc in zypper ps. (bsc#1096617)
- Show GPGME version in log
- Adapt to changes in libgpgme11-11.1.0 breaking the signature verification (bsc#1100427)
- RepoInfo::provideKey: add report telling where we look for missing keys.
- Support listing gpgkey URLs in repo files (bsc#1088037)
- Add new report to request user approval for importing a package key
- Handle http error 502 Bad Gateway in curl backend (bsc#1070851)
- Add filesize check for downloads with known size (bsc#408814)
- Removed superfluous space in translation (bsc#1102019)
- Prevent the system from sleeping during a commit
- RepoManager: Explicitly request repo2solv to generate application pseudo packages.
- libzypp-devel should not require cmake (bsc#1101349)
- Avoid zombies from ExternalProgram
- Update ApiConfig
- HardLocksFile: Prevent against empty commit without Target having
  been been loaded (bsc#1096803)
- lsof: use '-K i' if lsof supports it (bsc#1099847)
- Add filesize check for downloads with known size (bsc#408814)
- Fix detection of metalink downloads and prevent aborting if a metalink file
  is larger than the expected data file.
- Require libsolv-devel &amp;gt;= 0.6.35 during build (fixing bsc#1100095)
- Make use of %license macro (bsc#1082318)

Security fix in zypper:

- CVE-2017-9269: Improve signature check callback messages (bsc#1045735)

Changes in zypper:

- Always set error status if any nr of unknown repositories are passed to lr and ref (bsc#1093103)
- Notify user about unsupported rpm V3 keys in an old rpm database (bsc#1096217)
- Detect read only filesystem on system modifying operations (fixes #199)
- Use %license (bsc#1082318)
- Handle repo aliases containing multiple ':' in the PackageArgs parser (bsc #1041178)
- Fix broken display of detailed query results.
- Fix broken search for items with a dash. (bsc#907538, bsc#1043166, bsc#1070770)
- Disable repository operations when searching installed packages. (bsc#1084525)
- Prevent nested calls to exit() if aborted by a signal. (bsc#1092413)
- ansi.h: Prevent ESC sequence strings from going out of scope. (bsc#1092413)
- Fix some translation errors.
- Support listing gpgkey URLs in repo files (bsc#1088037)
- Check for root privileges in zypper verify and si (bsc#1058515)
- XML &amp;lt;install-summary&amp;gt; attribute `packages-to-change` added (bsc#1102429)
- Add expert (allow-*) options to all installer commands (bsc#428822)
- Sort search results by multiple columns (bsc#1066215)
- man: Strengthen that `--config FILE' affects zypper.conf, not zypp.conf (bsc#1100028)
- Set error status if repositories passed to lr and ref are not known (bsc#1093103)
- Do not override table style in search
- Fix out of bound read in MbsIterator
- Add --supplements switch to search and info
- Add setter functions for zypp cache related config values to ZConfig

Changes in libsolv:

- convert repo2solv.sh script into a binary tool
- Make use of %license macro (bsc#1082318)

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-09/msg00035.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:2739-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libsolv-0.6.35-lp150.2.3.1">
      <FullProductName ProductID="libsolv-0.6.35-lp150.2.3.1">libsolv-0.6.35-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsolv-demo-0.6.35-lp150.2.3.1">
      <FullProductName ProductID="libsolv-demo-0.6.35-lp150.2.3.1">libsolv-demo-0.6.35-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsolv-devel-0.6.35-lp150.2.3.1">
      <FullProductName ProductID="libsolv-devel-0.6.35-lp150.2.3.1">libsolv-devel-0.6.35-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsolv-tools-0.6.35-lp150.2.3.1">
      <FullProductName ProductID="libsolv-tools-0.6.35-lp150.2.3.1">libsolv-tools-0.6.35-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libzypp-17.6.4-lp150.2.3.1">
      <FullProductName ProductID="libzypp-17.6.4-lp150.2.3.1">libzypp-17.6.4-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libzypp-devel-17.6.4-lp150.2.3.1">
      <FullProductName ProductID="libzypp-devel-17.6.4-lp150.2.3.1">libzypp-devel-17.6.4-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libzypp-devel-doc-17.6.4-lp150.2.3.1">
      <FullProductName ProductID="libzypp-devel-doc-17.6.4-lp150.2.3.1">libzypp-devel-doc-17.6.4-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-solv-0.6.35-lp150.2.3.1">
      <FullProductName ProductID="perl-solv-0.6.35-lp150.2.3.1">perl-solv-0.6.35-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-solv-0.6.35-lp150.2.3.1">
      <FullProductName ProductID="python-solv-0.6.35-lp150.2.3.1">python-solv-0.6.35-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-solv-0.6.35-lp150.2.3.1">
      <FullProductName ProductID="python3-solv-0.6.35-lp150.2.3.1">python3-solv-0.6.35-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby-solv-0.6.35-lp150.2.3.1">
      <FullProductName ProductID="ruby-solv-0.6.35-lp150.2.3.1">ruby-solv-0.6.35-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zypper-1.14.10-lp150.2.3.1">
      <FullProductName ProductID="zypper-1.14.10-lp150.2.3.1">zypper-1.14.10-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zypper-aptitude-1.14.10-lp150.2.3.1">
      <FullProductName ProductID="zypper-aptitude-1.14.10-lp150.2.3.1">zypper-aptitude-1.14.10-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zypper-log-1.14.10-lp150.2.3.1">
      <FullProductName ProductID="zypper-log-1.14.10-lp150.2.3.1">zypper-log-1.14.10-lp150.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libsolv-0.6.35-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libsolv-0.6.35-lp150.2.3.1">libsolv-0.6.35-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsolv-demo-0.6.35-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libsolv-demo-0.6.35-lp150.2.3.1">libsolv-demo-0.6.35-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsolv-devel-0.6.35-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libsolv-devel-0.6.35-lp150.2.3.1">libsolv-devel-0.6.35-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsolv-tools-0.6.35-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libsolv-tools-0.6.35-lp150.2.3.1">libsolv-tools-0.6.35-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libzypp-17.6.4-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libzypp-17.6.4-lp150.2.3.1">libzypp-17.6.4-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libzypp-devel-17.6.4-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libzypp-devel-17.6.4-lp150.2.3.1">libzypp-devel-17.6.4-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libzypp-devel-doc-17.6.4-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libzypp-devel-doc-17.6.4-lp150.2.3.1">libzypp-devel-doc-17.6.4-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-solv-0.6.35-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:perl-solv-0.6.35-lp150.2.3.1">perl-solv-0.6.35-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python-solv-0.6.35-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python-solv-0.6.35-lp150.2.3.1">python-solv-0.6.35-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-solv-0.6.35-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python3-solv-0.6.35-lp150.2.3.1">python3-solv-0.6.35-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby-solv-0.6.35-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:ruby-solv-0.6.35-lp150.2.3.1">ruby-solv-0.6.35-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="zypper-1.14.10-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:zypper-1.14.10-lp150.2.3.1">zypper-1.14.10-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="zypper-aptitude-1.14.10-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:zypper-aptitude-1.14.10-lp150.2.3.1">zypper-aptitude-1.14.10-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="zypper-log-1.14.10-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:zypper-log-1.14.10-lp150.2.3.1">zypper-log-1.14.10-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content.</Note>
    </Notes>
    <CVE>CVE-2017-9269</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libsolv-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libsolv-demo-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libsolv-devel-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libsolv-tools-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libzypp-17.6.4-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libzypp-devel-17.6.4-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libzypp-devel-doc-17.6.4-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:perl-solv-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python-solv-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-solv-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:ruby-solv-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:zypper-1.14.10-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:zypper-aptitude-1.14.10-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:zypper-log-1.14.10-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-09/msg00035.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9269.html</URL>
        <Description>CVE-2017-9269</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038984</URL>
        <Description>SUSE Bug 1038984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045735</URL>
        <Description>SUSE Bug 1045735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download.</Note>
    </Notes>
    <CVE>CVE-2018-7685</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libsolv-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libsolv-demo-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libsolv-devel-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libsolv-tools-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libzypp-17.6.4-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libzypp-devel-17.6.4-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libzypp-devel-doc-17.6.4-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:perl-solv-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python-solv-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-solv-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:ruby-solv-0.6.35-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:zypper-1.14.10-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:zypper-aptitude-1.14.10-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:zypper-log-1.14.10-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-09/msg00035.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7685.html</URL>
        <Description>CVE-2018-7685</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045735</URL>
        <Description>SUSE Bug 1045735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088705</URL>
        <Description>SUSE Bug 1088705</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091624</URL>
        <Description>SUSE Bug 1091624</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
