<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libipa_hbac-devel-1.14.2-3.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10427</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libipa_hbac-devel-1.14.2-3.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libipa_hbac-devel-1.14.2-3.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10427</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10427</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4341/</URL>
      <Description>SUSE CVE CVE-2010-4341 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1758/</URL>
      <Description>SUSE CVE CVE-2011-1758 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0219/</URL>
      <Description>SUSE CVE CVE-2013-0219 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0220/</URL>
      <Description>SUSE CVE CVE-2013-0220 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0287/</URL>
      <Description>SUSE CVE CVE-2013-0287 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0249/</URL>
      <Description>SUSE CVE CVE-2014-0249 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libipa_hbac-devel-1.14.2-3.1">
      <FullProductName ProductID="libipa_hbac-devel-1.14.2-3.1">libipa_hbac-devel-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libipa_hbac0-1.14.2-3.1">
      <FullProductName ProductID="libipa_hbac0-1.14.2-3.1">libipa_hbac0-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnfsidmap-sss-1.14.2-3.1">
      <FullProductName ProductID="libnfsidmap-sss-1.14.2-3.1">libnfsidmap-sss-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsss_idmap-devel-1.14.2-3.1">
      <FullProductName ProductID="libsss_idmap-devel-1.14.2-3.1">libsss_idmap-devel-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsss_idmap0-1.14.2-3.1">
      <FullProductName ProductID="libsss_idmap0-1.14.2-3.1">libsss_idmap0-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsss_nss_idmap-devel-1.14.2-3.1">
      <FullProductName ProductID="libsss_nss_idmap-devel-1.14.2-3.1">libsss_nss_idmap-devel-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsss_nss_idmap0-1.14.2-3.1">
      <FullProductName ProductID="libsss_nss_idmap0-1.14.2-3.1">libsss_nss_idmap0-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsss_simpleifp-devel-1.14.2-3.1">
      <FullProductName ProductID="libsss_simpleifp-devel-1.14.2-3.1">libsss_simpleifp-devel-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsss_simpleifp0-1.14.2-3.1">
      <FullProductName ProductID="libsss_simpleifp0-1.14.2-3.1">libsss_simpleifp0-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-ipa_hbac-1.14.2-3.1">
      <FullProductName ProductID="python-ipa_hbac-1.14.2-3.1">python-ipa_hbac-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-sss-murmur-1.14.2-3.1">
      <FullProductName ProductID="python-sss-murmur-1.14.2-3.1">python-sss-murmur-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-sss_nss_idmap-1.14.2-3.1">
      <FullProductName ProductID="python-sss_nss_idmap-1.14.2-3.1">python-sss_nss_idmap-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-sssd-config-1.14.2-3.1">
      <FullProductName ProductID="python-sssd-config-1.14.2-3.1">python-sssd-config-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-ipa_hbac-1.14.2-3.1">
      <FullProductName ProductID="python3-ipa_hbac-1.14.2-3.1">python3-ipa_hbac-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-sss-murmur-1.14.2-3.1">
      <FullProductName ProductID="python3-sss-murmur-1.14.2-3.1">python3-sss-murmur-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-sss_nss_idmap-1.14.2-3.1">
      <FullProductName ProductID="python3-sss_nss_idmap-1.14.2-3.1">python3-sss_nss_idmap-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-sssd-config-1.14.2-3.1">
      <FullProductName ProductID="python3-sssd-config-1.14.2-3.1">python3-sssd-config-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sssd-1.14.2-3.1">
      <FullProductName ProductID="sssd-1.14.2-3.1">sssd-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sssd-32bit-1.14.2-3.1">
      <FullProductName ProductID="sssd-32bit-1.14.2-3.1">sssd-32bit-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sssd-ad-1.14.2-3.1">
      <FullProductName ProductID="sssd-ad-1.14.2-3.1">sssd-ad-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sssd-dbus-1.14.2-3.1">
      <FullProductName ProductID="sssd-dbus-1.14.2-3.1">sssd-dbus-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sssd-ipa-1.14.2-3.1">
      <FullProductName ProductID="sssd-ipa-1.14.2-3.1">sssd-ipa-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sssd-krb5-1.14.2-3.1">
      <FullProductName ProductID="sssd-krb5-1.14.2-3.1">sssd-krb5-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sssd-krb5-common-1.14.2-3.1">
      <FullProductName ProductID="sssd-krb5-common-1.14.2-3.1">sssd-krb5-common-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sssd-ldap-1.14.2-3.1">
      <FullProductName ProductID="sssd-ldap-1.14.2-3.1">sssd-ldap-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sssd-proxy-1.14.2-3.1">
      <FullProductName ProductID="sssd-proxy-1.14.2-3.1">sssd-proxy-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sssd-tools-1.14.2-3.1">
      <FullProductName ProductID="sssd-tools-1.14.2-3.1">sssd-tools-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sssd-wbclient-1.14.2-3.1">
      <FullProductName ProductID="sssd-wbclient-1.14.2-3.1">sssd-wbclient-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sssd-wbclient-devel-1.14.2-3.1">
      <FullProductName ProductID="sssd-wbclient-devel-1.14.2-3.1">sssd-wbclient-devel-1.14.2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sssd-winbind-idmap-1.14.2-3.1">
      <FullProductName ProductID="sssd-winbind-idmap-1.14.2-3.1">sssd-winbind-idmap-1.14.2-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libipa_hbac-devel-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libipa_hbac-devel-1.14.2-3.1">libipa_hbac-devel-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libipa_hbac0-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libipa_hbac0-1.14.2-3.1">libipa_hbac0-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnfsidmap-sss-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libnfsidmap-sss-1.14.2-3.1">libnfsidmap-sss-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsss_idmap-devel-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsss_idmap-devel-1.14.2-3.1">libsss_idmap-devel-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsss_idmap0-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsss_idmap0-1.14.2-3.1">libsss_idmap0-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsss_nss_idmap-devel-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsss_nss_idmap-devel-1.14.2-3.1">libsss_nss_idmap-devel-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsss_nss_idmap0-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsss_nss_idmap0-1.14.2-3.1">libsss_nss_idmap0-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsss_simpleifp-devel-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsss_simpleifp-devel-1.14.2-3.1">libsss_simpleifp-devel-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsss_simpleifp0-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsss_simpleifp0-1.14.2-3.1">libsss_simpleifp0-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python-ipa_hbac-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python-ipa_hbac-1.14.2-3.1">python-ipa_hbac-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python-sss-murmur-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python-sss-murmur-1.14.2-3.1">python-sss-murmur-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python-sss_nss_idmap-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python-sss_nss_idmap-1.14.2-3.1">python-sss_nss_idmap-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python-sssd-config-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python-sssd-config-1.14.2-3.1">python-sssd-config-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-ipa_hbac-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python3-ipa_hbac-1.14.2-3.1">python3-ipa_hbac-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-sss-murmur-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python3-sss-murmur-1.14.2-3.1">python3-sss-murmur-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-sss_nss_idmap-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python3-sss_nss_idmap-1.14.2-3.1">python3-sss_nss_idmap-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-sssd-config-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python3-sssd-config-1.14.2-3.1">python3-sssd-config-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sssd-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sssd-1.14.2-3.1">sssd-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sssd-32bit-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sssd-32bit-1.14.2-3.1">sssd-32bit-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sssd-ad-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sssd-ad-1.14.2-3.1">sssd-ad-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sssd-dbus-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sssd-dbus-1.14.2-3.1">sssd-dbus-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sssd-ipa-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sssd-ipa-1.14.2-3.1">sssd-ipa-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sssd-krb5-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sssd-krb5-1.14.2-3.1">sssd-krb5-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sssd-krb5-common-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sssd-krb5-common-1.14.2-3.1">sssd-krb5-common-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sssd-ldap-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sssd-ldap-1.14.2-3.1">sssd-ldap-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sssd-proxy-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sssd-proxy-1.14.2-3.1">sssd-proxy-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sssd-tools-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sssd-tools-1.14.2-3.1">sssd-tools-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sssd-wbclient-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sssd-wbclient-1.14.2-3.1">sssd-wbclient-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sssd-wbclient-devel-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sssd-wbclient-devel-1.14.2-3.1">sssd-wbclient-devel-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sssd-winbind-idmap-1.14.2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sssd-winbind-idmap-1.14.2-3.1">sssd-winbind-idmap-1.14.2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2010-4341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libipa_hbac-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libipa_hbac0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnfsidmap-sss-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_idmap-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_idmap0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_nss_idmap-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_nss_idmap0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_simpleifp-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_simpleifp0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-ipa_hbac-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sss-murmur-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sss_nss_idmap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sssd-config-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ipa_hbac-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sss-murmur-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sss_nss_idmap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sssd-config-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-32bit-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ad-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-dbus-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ipa-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-krb5-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-krb5-common-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ldap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-proxy-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-tools-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-wbclient-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-wbclient-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-winbind-idmap-1.14.2-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4341.html</URL>
        <Description>CVE-2010-4341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/660481</URL>
        <Description>SUSE Bug 660481</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname.</Note>
    </Notes>
    <CVE>CVE-2011-1758</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libipa_hbac-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libipa_hbac0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnfsidmap-sss-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_idmap-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_idmap0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_nss_idmap-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_nss_idmap0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_simpleifp-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_simpleifp0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-ipa_hbac-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sss-murmur-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sss_nss_idmap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sssd-config-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ipa_hbac-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sss-murmur-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sss_nss_idmap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sssd-config-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-32bit-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ad-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-dbus-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ipa-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-krb5-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-krb5-common-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ldap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-proxy-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-tools-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-wbclient-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-wbclient-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-winbind-idmap-1.14.2-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1758.html</URL>
        <Description>CVE-2011-1758</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/691135</URL>
        <Description>SUSE Bug 691135</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files.</Note>
    </Notes>
    <CVE>CVE-2013-0219</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libipa_hbac-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libipa_hbac0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnfsidmap-sss-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_idmap-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_idmap0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_nss_idmap-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_nss_idmap0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_simpleifp-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_simpleifp0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-ipa_hbac-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sss-murmur-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sss_nss_idmap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sssd-config-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ipa_hbac-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sss-murmur-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sss_nss_idmap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sssd-config-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-32bit-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ad-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-dbus-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ipa-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-krb5-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-krb5-common-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ldap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-proxy-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-tools-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-wbclient-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-wbclient-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-winbind-idmap-1.14.2-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.7</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0219.html</URL>
        <Description>CVE-2013-0219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801036</URL>
        <Description>SUSE Bug 801036</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) sss_autofs_cmd_getautomntent and (2) sss_autofs_cmd_getautomntbyname function in responder/autofs/autofssrv_cmd.c and the (3) ssh_cmd_parse_request function in responder/ssh/sshsrv_cmd.c in System Security Services Daemon (SSSD) before 1.9.4 allow remote attackers to cause a denial of service (out-of-bounds read, crash, and restart) via a crafted SSSD packet.</Note>
    </Notes>
    <CVE>CVE-2013-0220</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libipa_hbac-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libipa_hbac0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnfsidmap-sss-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_idmap-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_idmap0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_nss_idmap-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_nss_idmap0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_simpleifp-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_simpleifp0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-ipa_hbac-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sss-murmur-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sss_nss_idmap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sssd-config-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ipa_hbac-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sss-murmur-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sss_nss_idmap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sssd-config-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-32bit-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ad-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-dbus-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ipa-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-krb5-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-krb5-common-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ldap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-proxy-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-tools-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-wbclient-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-wbclient-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-winbind-idmap-1.14.2-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0220.html</URL>
        <Description>CVE-2013-0220</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801036</URL>
        <Description>SUSE Bug 801036</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.</Note>
    </Notes>
    <CVE>CVE-2013-0287</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libipa_hbac-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libipa_hbac0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnfsidmap-sss-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_idmap-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_idmap0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_nss_idmap-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_nss_idmap0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_simpleifp-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_simpleifp0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-ipa_hbac-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sss-murmur-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sss_nss_idmap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sssd-config-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ipa_hbac-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sss-murmur-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sss_nss_idmap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sssd-config-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-32bit-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ad-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-dbus-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ipa-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-krb5-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-krb5-common-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ldap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-proxy-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-tools-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-wbclient-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-wbclient-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-winbind-idmap-1.14.2-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0287.html</URL>
        <Description>CVE-2013-0287</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/809153</URL>
        <Description>SUSE Bug 809153</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2014-0249</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libipa_hbac-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libipa_hbac0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnfsidmap-sss-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_idmap-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_idmap0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_nss_idmap-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_nss_idmap0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_simpleifp-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsss_simpleifp0-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-ipa_hbac-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sss-murmur-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sss_nss_idmap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python-sssd-config-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-ipa_hbac-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sss-murmur-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sss_nss_idmap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-sssd-config-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-32bit-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ad-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-dbus-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ipa-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-krb5-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-krb5-common-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-ldap-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-proxy-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-tools-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-wbclient-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-wbclient-devel-1.14.2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:sssd-winbind-idmap-1.14.2-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.4</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0249.html</URL>
        <Description>CVE-2014-0249</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880245</URL>
        <Description>SUSE Bug 880245</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
