<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libzypp, zypper</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2017:2040-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-08-03T14:42:36Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-08-03T14:42:36Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-08-03T14:42:36Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libzypp, zypper</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">The Software Update Stack was updated to receive fixes and enhancements.

libzypp:

Security issues fixed:
- CVE-2017-7435, CVE-2017-7436, CVE-2017-9269: Fix GPG check workflows, mainly for unsigned
  repositories and packages. (bsc#1045735, bsc#1038984)

Bug fixes:
- Re-probe on refresh if the repository type changes. (bsc#1048315)
- Propagate proper error code to DownloadProgressReport. (bsc#1047785)
- Allow to trigger an appdata refresh unconditionally. (bsc#1009745)
- Support custom repo variables defined in /etc/zypp/vars.d.
- Adapt loop mounting of ISO images. (bsc#1038132, bsc#1033236)
- Fix potential crash if repository has no baseurl. (bsc#1043218)

zypper:

- Adapt download callback to report and handle unsigned packages. (bsc#1038984)
- Report missing/optional files as 'not found' rather than 'error'. (bsc#1047785)
- Document support for custom repository variables defined in /etc/zypp/vars.d.
- Emphasize that it depends on how fast PackageKit will respond to a 'quit' request sent
  if PK blocks package management.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1252,SUSE-SLE-DESKTOP-12-SP2-2017-1252,SUSE-SLE-RPI-12-SP2-2017-1252,SUSE-SLE-SDK-12-SP2-2017-1252,SUSE-SLE-SERVER-12-SP2-2017-1252</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172040-1/</URL>
      <Description>Link for SUSE-SU-2017:2040-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html</URL>
      <Description>E-Mail link for SUSE-SU-2017:2040-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1009745</URL>
      <Description>SUSE Bug 1009745</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1031756</URL>
      <Description>SUSE Bug 1031756</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1033236</URL>
      <Description>SUSE Bug 1033236</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1038132</URL>
      <Description>SUSE Bug 1038132</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1038984</URL>
      <Description>SUSE Bug 1038984</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1043218</URL>
      <Description>SUSE Bug 1043218</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1045735</URL>
      <Description>SUSE Bug 1045735</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1047785</URL>
      <Description>SUSE Bug 1047785</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1048315</URL>
      <Description>SUSE Bug 1048315</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7435/</URL>
      <Description>SUSE CVE CVE-2017-7435 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7436/</URL>
      <Description>SUSE CVE CVE-2017-7436 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9269/</URL>
      <Description>SUSE CVE CVE-2017-9269 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2" CPE="cpe:/o:suse:sled:12:sp2">SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2" CPE="cpe:/o:suse:sles:12:sp2">SUSE Linux Enterprise Server 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" CPE="cpe:/o:suse:sles:12:sp2">SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2" CPE="cpe:/o:suse:sles_sap:12:sp2">SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2" CPE="cpe:/o:suse:sle-sdk:12:sp2">SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libzypp-16.15.2-27.21.1">
      <FullProductName ProductID="libzypp-16.15.2-27.21.1">libzypp-16.15.2-27.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zypper-1.13.30-18.13.3">
      <FullProductName ProductID="zypper-1.13.30-18.13.3">zypper-1.13.30-18.13.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zypper-log-1.13.30-18.13.3">
      <FullProductName ProductID="zypper-log-1.13.30-18.13.3">zypper-log-1.13.30-18.13.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libzypp-devel-16.15.2-27.21.1">
      <FullProductName ProductID="libzypp-devel-16.15.2-27.21.1">libzypp-devel-16.15.2-27.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libzypp-devel-doc-16.15.2-27.21.1">
      <FullProductName ProductID="libzypp-devel-doc-16.15.2-27.21.1">libzypp-devel-doc-16.15.2-27.21.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libzypp-16.15.2-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2:libzypp-16.15.2-27.21.1">libzypp-16.15.2-27.21.1 as a component of SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="zypper-1.13.30-18.13.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2:zypper-1.13.30-18.13.3">zypper-1.13.30-18.13.3 as a component of SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="zypper-log-1.13.30-18.13.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2:zypper-log-1.13.30-18.13.3">zypper-log-1.13.30-18.13.3 as a component of SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libzypp-16.15.2-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2:libzypp-16.15.2-27.21.1">libzypp-16.15.2-27.21.1 as a component of SUSE Linux Enterprise Server 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="zypper-1.13.30-18.13.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2:zypper-1.13.30-18.13.3">zypper-1.13.30-18.13.3 as a component of SUSE Linux Enterprise Server 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="zypper-log-1.13.30-18.13.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2:zypper-log-1.13.30-18.13.3">zypper-log-1.13.30-18.13.3 as a component of SUSE Linux Enterprise Server 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libzypp-16.15.2-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libzypp-16.15.2-27.21.1">libzypp-16.15.2-27.21.1 as a component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="zypper-1.13.30-18.13.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:zypper-1.13.30-18.13.3">zypper-1.13.30-18.13.3 as a component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="zypper-log-1.13.30-18.13.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:zypper-log-1.13.30-18.13.3">zypper-log-1.13.30-18.13.3 as a component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libzypp-16.15.2-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2:libzypp-16.15.2-27.21.1">libzypp-16.15.2-27.21.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="zypper-1.13.30-18.13.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2:zypper-1.13.30-18.13.3">zypper-1.13.30-18.13.3 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="zypper-log-1.13.30-18.13.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2:zypper-log-1.13.30-18.13.3">zypper-log-1.13.30-18.13.3 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libzypp-devel-16.15.2-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2:libzypp-devel-16.15.2-27.21.1">libzypp-devel-16.15.2-27.21.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libzypp-devel-doc-16.15.2-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2:libzypp-devel-doc-16.15.2-27.21.1">libzypp-devel-doc-16.15.2-27.21.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.</Note>
    </Notes>
    <CVE>CVE-2017-7435</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:libzypp-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:zypper-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:zypper-log-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:libzypp-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:zypper-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:zypper-log-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libzypp-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:zypper-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:zypper-log-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:libzypp-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:zypper-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:zypper-log-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libzypp-devel-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libzypp-devel-doc-16.15.2-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172040-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7435.html</URL>
        <Description>CVE-2017-7435</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009127</URL>
        <Description>SUSE Bug 1009127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038984</URL>
        <Description>SUSE Bug 1038984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045735</URL>
        <Description>SUSE Bug 1045735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.</Note>
    </Notes>
    <CVE>CVE-2017-7436</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:libzypp-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:zypper-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:zypper-log-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:libzypp-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:zypper-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:zypper-log-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libzypp-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:zypper-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:zypper-log-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:libzypp-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:zypper-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:zypper-log-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libzypp-devel-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libzypp-devel-doc-16.15.2-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172040-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7436.html</URL>
        <Description>CVE-2017-7436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008325</URL>
        <Description>SUSE Bug 1008325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009127</URL>
        <Description>SUSE Bug 1009127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038984</URL>
        <Description>SUSE Bug 1038984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045735</URL>
        <Description>SUSE Bug 1045735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content.</Note>
    </Notes>
    <CVE>CVE-2017-9269</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:libzypp-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:zypper-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:zypper-log-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:libzypp-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:zypper-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:zypper-log-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libzypp-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:zypper-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:zypper-log-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:libzypp-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:zypper-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:zypper-log-1.13.30-18.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libzypp-devel-16.15.2-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libzypp-devel-doc-16.15.2-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172040-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9269.html</URL>
        <Description>CVE-2017-9269</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038984</URL>
        <Description>SUSE Bug 1038984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045735</URL>
        <Description>SUSE Bug 1045735</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
