<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for smt, yast2-smt</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:2898-2</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-10-18T12:49:39Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-10-18T12:49:39Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-10-18T12:49:39Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for smt, yast2-smt</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for yast2-smt to 3.0.14 and smt to 3.0.37 fixes the following issues:

These security issues were fixed in SMT:

- CVE-2018-12471: Xml External Entity processing in the RegistrationSharing
  modules allowed to read arbitrary file read (bsc#1103809).
- CVE-2018-12470: SQL injection in RegistrationSharing module allows remote
  attackers to run arbitrary SQL statements (bsc#1103810).
- CVE-2018-12472: Authentication bypass in sibling check facilitated further
  attacks on SMT (bsc#1104076).

SUSE would like to thank Jake Miller for reporting these issues to us.

These non-security issues were fixed in SMT:

- Fix cron jobs randomization (bsc#1097560)
- Fix duplicate migration paths (bsc#1097824)

This non-security issue was fixed in yast2-smt:

- Remove cron job rescheduling (bsc#1097560)
- Added missing translation marks (bsc#1037811)
- Explicitly mention 'Organization Credentials' (fate#321759)
- Rearrange the SMT set-up dialog (bsc#977043)
- Make the Filter button default (bsc#1006984)
- Prevent exiting the repo selection dialog via hitting Enter in
  the repository filter (bsc#1006984)
- report when error occurs during repo mirroring (bsc#1006989)
- Use TextEntry-based filter for repos (fate#319777)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SERVER-12-SP2-BCL-2018-2056</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182898-2/</URL>
      <Description>Link for SUSE-SU-2018:2898-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-October/004724.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:2898-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1006984</URL>
      <Description>SUSE Bug 1006984</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1006989</URL>
      <Description>SUSE Bug 1006989</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1037811</URL>
      <Description>SUSE Bug 1037811</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1097560</URL>
      <Description>SUSE Bug 1097560</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1097824</URL>
      <Description>SUSE Bug 1097824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1103809</URL>
      <Description>SUSE Bug 1103809</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1103810</URL>
      <Description>SUSE Bug 1103810</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1104076</URL>
      <Description>SUSE Bug 1104076</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/977043</URL>
      <Description>SUSE Bug 977043</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12470/</URL>
      <Description>SUSE CVE CVE-2018-12470 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12471/</URL>
      <Description>SUSE CVE CVE-2018-12471 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12472/</URL>
      <Description>SUSE CVE CVE-2018-12472 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP2-BCL">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP2-BCL">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL" CPE="cpe:/o:suse:sles-bcl:12:sp2">SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="res-signingkeys-3.0.37-52.23.6">
      <FullProductName ProductID="res-signingkeys-3.0.37-52.23.6">res-signingkeys-3.0.37-52.23.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="smt-3.0.37-52.23.6">
      <FullProductName ProductID="smt-3.0.37-52.23.6">smt-3.0.37-52.23.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="smt-support-3.0.37-52.23.6">
      <FullProductName ProductID="smt-support-3.0.37-52.23.6">smt-support-3.0.37-52.23.6</FullProductName>
    </Branch>
    <Relationship ProductReference="res-signingkeys-3.0.37-52.23.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:res-signingkeys-3.0.37-52.23.6">res-signingkeys-3.0.37-52.23.6 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="smt-3.0.37-52.23.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:smt-3.0.37-52.23.6">smt-3.0.37-52.23.6 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="smt-support-3.0.37-52.23.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:smt-support-3.0.37-52.23.6">smt-support-3.0.37-52.23.6 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A SQL Injection in the RegistrationSharing module of SUSE Linux SMT allows remote attackers to cause execute arbitrary SQL statements. Affected releases are SUSE Linux SMT: versions prior to 3.0.37.</Note>
    </Notes>
    <CVE>CVE-2018-12470</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:res-signingkeys-3.0.37-52.23.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:smt-3.0.37-52.23.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:smt-support-3.0.37-52.23.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182898-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12470.html</URL>
        <Description>CVE-2018-12470</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103810</URL>
        <Description>SUSE Bug 1103810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A External Entity Reference ('XXE') vulnerability in SUSE Linux SMT allows remote attackers to read data from the server or cause DoS by referencing blocking elements. Affected releases are SUSE Linux SMT: versions prior to 3.0.37.</Note>
    </Notes>
    <CVE>CVE-2018-12471</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:res-signingkeys-3.0.37-52.23.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:smt-3.0.37-52.23.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:smt-support-3.0.37-52.23.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182898-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12471.html</URL>
        <Description>CVE-2018-12471</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103809</URL>
        <Description>SUSE Bug 1103809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A improper authentication using the HOST header in SUSE Linux SMT allows remote attackers to spoof a sibling server. Affected releases are SUSE Linux SMT: versions prior to 3.0.37.</Note>
    </Notes>
    <CVE>CVE-2018-12472</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:res-signingkeys-3.0.37-52.23.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:smt-3.0.37-52.23.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:smt-support-3.0.37-52.23.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182898-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12472.html</URL>
        <Description>CVE-2018-12472</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1104076</URL>
        <Description>SUSE Bug 1104076</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
