<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">NetworkManager-1.32.10-2.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10602-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">NetworkManager-1.32.10-2.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the NetworkManager-1.32.10-2.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10602</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000135/</URL>
      <Description>SUSE CVE CVE-2018-1000135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15688/</URL>
      <Description>SUSE CVE CVE-2018-15688 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10754/</URL>
      <Description>SUSE CVE CVE-2020-10754 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13529/</URL>
      <Description>SUSE CVE CVE-2020-13529 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20297/</URL>
      <Description>SUSE CVE CVE-2021-20297 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="NetworkManager-1.32.10-2.1">
      <FullProductName ProductID="NetworkManager-1.32.10-2.1">NetworkManager-1.32.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="NetworkManager-branding-upstream-1.32.10-2.1">
      <FullProductName ProductID="NetworkManager-branding-upstream-1.32.10-2.1">NetworkManager-branding-upstream-1.32.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="NetworkManager-devel-1.32.10-2.1">
      <FullProductName ProductID="NetworkManager-devel-1.32.10-2.1">NetworkManager-devel-1.32.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="NetworkManager-devel-32bit-1.32.10-2.1">
      <FullProductName ProductID="NetworkManager-devel-32bit-1.32.10-2.1">NetworkManager-devel-32bit-1.32.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="NetworkManager-lang-1.32.10-2.1">
      <FullProductName ProductID="NetworkManager-lang-1.32.10-2.1">NetworkManager-lang-1.32.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnm0-1.32.10-2.1">
      <FullProductName ProductID="libnm0-1.32.10-2.1">libnm0-1.32.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnm0-32bit-1.32.10-2.1">
      <FullProductName ProductID="libnm0-32bit-1.32.10-2.1">libnm0-32bit-1.32.10-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-NM-1_0-1.32.10-2.1">
      <FullProductName ProductID="typelib-1_0-NM-1_0-1.32.10-2.1">typelib-1_0-NM-1_0-1.32.10-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="NetworkManager-1.32.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:NetworkManager-1.32.10-2.1">NetworkManager-1.32.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="NetworkManager-branding-upstream-1.32.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:NetworkManager-branding-upstream-1.32.10-2.1">NetworkManager-branding-upstream-1.32.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="NetworkManager-devel-1.32.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:NetworkManager-devel-1.32.10-2.1">NetworkManager-devel-1.32.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="NetworkManager-devel-32bit-1.32.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:NetworkManager-devel-32bit-1.32.10-2.1">NetworkManager-devel-32bit-1.32.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="NetworkManager-lang-1.32.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:NetworkManager-lang-1.32.10-2.1">NetworkManager-lang-1.32.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnm0-1.32.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libnm0-1.32.10-2.1">libnm0-1.32.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnm0-32bit-1.32.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libnm0-32bit-1.32.10-2.1">libnm0-32bit-1.32.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-NM-1_0-1.32.10-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:typelib-1_0-NM-1_0-1.32.10-2.1">typelib-1_0-NM-1_0-1.32.10-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNOME NetworkManager version 1.10.2 and earlier contains a Information Exposure (CWE-200) vulnerability in DNS resolver that can result in Private DNS queries leaked to local network's DNS servers, while on VPN. This vulnerability appears to have been fixed in Some Ubuntu 16.04 packages were fixed, but later updates removed the fix. cf. https://bugs.launchpad.net/ubuntu/+bug/1754671 an upstream fix does not appear to be available at this time.</Note>
    </Notes>
    <CVE>CVE-2018-1000135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:NetworkManager-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-branding-upstream-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-devel-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-devel-32bit-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-lang-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnm0-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnm0-32bit-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-NM-1_0-1.32.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000135.html</URL>
        <Description>CVE-2018-1000135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086263</URL>
        <Description>SUSE Bug 1086263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.</Note>
    </Notes>
    <CVE>CVE-2018-15688</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:NetworkManager-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-branding-upstream-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-devel-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-devel-32bit-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-lang-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnm0-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnm0-32bit-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-NM-1_0-1.32.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15688.html</URL>
        <Description>CVE-2018-15688</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113632</URL>
        <Description>SUSE Bug 1113632</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113668</URL>
        <Description>SUSE Bug 1113668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113669</URL>
        <Description>SUSE Bug 1113669</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was found that nmcli, a command line interface to NetworkManager did not honour 802-1x.ca-path and 802-1x.phase2-ca-path settings, when creating a new profile. When a user connects to a network using this profile, the authentication does not happen and the connection is made insecurely.</Note>
    </Notes>
    <CVE>CVE-2020-10754</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:NetworkManager-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-branding-upstream-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-devel-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-devel-32bit-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-lang-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnm0-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnm0-32bit-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-NM-1_0-1.32.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10754.html</URL>
        <Description>CVE-2020-10754</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172457</URL>
        <Description>SUSE Bug 1172457</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.</Note>
    </Notes>
    <CVE>CVE-2020-13529</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:NetworkManager-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-branding-upstream-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-devel-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-devel-32bit-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-lang-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnm0-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnm0-32bit-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-NM-1_0-1.32.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13529.html</URL>
        <Description>CVE-2020-13529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185972</URL>
        <Description>SUSE Bug 1185972</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in NetworkManager in versions before 1.30.0. Setting match.path and activating a profile crashes NetworkManager. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2021-20297</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:NetworkManager-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-branding-upstream-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-devel-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-devel-32bit-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:NetworkManager-lang-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnm0-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libnm0-32bit-1.32.10-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-NM-1_0-1.32.10-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20297.html</URL>
        <Description>CVE-2021-20297</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184433</URL>
        <Description>SUSE Bug 1184433</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
