<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11107</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11107</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11107</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12473/</URL>
      <Description>SUSE CVE CVE-2018-12473 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12474/</URL>
      <Description>SUSE CVE CVE-2018-12474 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12476/</URL>
      <Description>SUSE CVE CVE-2018-12476 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="obs-service-appimage-0.10.28.1632141620.a8837d3-1.1">
      <FullProductName ProductID="obs-service-appimage-0.10.28.1632141620.a8837d3-1.1">obs-service-appimage-0.10.28.1632141620.a8837d3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1">
      <FullProductName ProductID="obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1">obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1">
      <FullProductName ProductID="obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1">obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1">
      <FullProductName ProductID="obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1">obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="obs-service-tar-0.10.28.1632141620.a8837d3-1.1">
      <FullProductName ProductID="obs-service-tar-0.10.28.1632141620.a8837d3-1.1">obs-service-tar-0.10.28.1632141620.a8837d3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1">
      <FullProductName ProductID="obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1">obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="obs-service-appimage-0.10.28.1632141620.a8837d3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1">obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1">obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1">obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1">obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="obs-service-tar-0.10.28.1632141620.a8837d3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1">obs-service-tar-0.10.28.1632141620.a8837d3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1">obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A path traversal traversal vulnerability in obs-service-tar_scm of Open Build Service allows remote attackers to cause access files not in the current build. On the server itself this is prevented by confining the worker via KVM. Affected releases are openSUSE Open Build Service: versions prior to 70d1aa4cc4d7b940180553a63805c22fc62e2cf0.</Note>
    </Notes>
    <CVE>CVE-2018-12473</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12473.html</URL>
        <Description>CVE-2018-12473</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105361</URL>
        <Description>SUSE Bug 1105361</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.</Note>
    </Notes>
    <CVE>CVE-2018-12474</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12474.html</URL>
        <Description>CVE-2018-12474</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107507</URL>
        <Description>SUSE Bug 1107507</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.</Note>
    </Notes>
    <CVE>CVE-2018-12476</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:obs-service-appimage-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-obs_scm-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-obs_scm-common-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-snapcraft-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-tar-0.10.28.1632141620.a8837d3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:obs-service-tar_scm-0.10.28.1632141620.a8837d3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12476.html</URL>
        <Description>CVE-2018-12476</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107944</URL>
        <Description>SUSE Bug 1107944</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
