<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">openafs-1.8.8-1.13 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11113-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">openafs-1.8.8-1.13 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the openafs-1.8.8-1.13 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11113</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16947/</URL>
      <Description>SUSE CVE CVE-2018-16947 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16948/</URL>
      <Description>SUSE CVE CVE-2018-16948 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16949/</URL>
      <Description>SUSE CVE CVE-2018-16949 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="openafs-1.8.8-1.13">
      <FullProductName ProductID="openafs-1.8.8-1.13">openafs-1.8.8-1.13</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openafs-authlibs-1.8.8-1.13">
      <FullProductName ProductID="openafs-authlibs-1.8.8-1.13">openafs-authlibs-1.8.8-1.13</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openafs-authlibs-devel-1.8.8-1.13">
      <FullProductName ProductID="openafs-authlibs-devel-1.8.8-1.13">openafs-authlibs-devel-1.8.8-1.13</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openafs-client-1.8.8-1.13">
      <FullProductName ProductID="openafs-client-1.8.8-1.13">openafs-client-1.8.8-1.13</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openafs-devel-1.8.8-1.13">
      <FullProductName ProductID="openafs-devel-1.8.8-1.13">openafs-devel-1.8.8-1.13</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openafs-fuse_client-1.8.8-1.13">
      <FullProductName ProductID="openafs-fuse_client-1.8.8-1.13">openafs-fuse_client-1.8.8-1.13</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openafs-kernel-source-1.8.8-1.13">
      <FullProductName ProductID="openafs-kernel-source-1.8.8-1.13">openafs-kernel-source-1.8.8-1.13</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openafs-kmp-default-1.8.8_k5.14.6_1-1.13">
      <FullProductName ProductID="openafs-kmp-default-1.8.8_k5.14.6_1-1.13">openafs-kmp-default-1.8.8_k5.14.6_1-1.13</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openafs-server-1.8.8-1.13">
      <FullProductName ProductID="openafs-server-1.8.8-1.13">openafs-server-1.8.8-1.13</FullProductName>
    </Branch>
    <Relationship ProductReference="openafs-1.8.8-1.13" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openafs-1.8.8-1.13">openafs-1.8.8-1.13 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openafs-authlibs-1.8.8-1.13" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openafs-authlibs-1.8.8-1.13">openafs-authlibs-1.8.8-1.13 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openafs-authlibs-devel-1.8.8-1.13" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openafs-authlibs-devel-1.8.8-1.13">openafs-authlibs-devel-1.8.8-1.13 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openafs-client-1.8.8-1.13" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openafs-client-1.8.8-1.13">openafs-client-1.8.8-1.13 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openafs-devel-1.8.8-1.13" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openafs-devel-1.8.8-1.13">openafs-devel-1.8.8-1.13 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openafs-fuse_client-1.8.8-1.13" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openafs-fuse_client-1.8.8-1.13">openafs-fuse_client-1.8.8-1.13 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openafs-kernel-source-1.8.8-1.13" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openafs-kernel-source-1.8.8-1.13">openafs-kernel-source-1.8.8-1.13 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openafs-kmp-default-1.8.8_k5.14.6_1-1.13" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openafs-kmp-default-1.8.8_k5.14.6_1-1.13">openafs-kmp-default-1.8.8_k5.14.6_1-1.13 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openafs-server-1.8.8-1.13" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openafs-server-1.8.8-1.13">openafs-server-1.8.8-1.13 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. The backup tape controller (butc) process accepts incoming RPCs but does not require (or allow for) authentication of those RPCs. Handling those RPCs results in operations being performed with administrator credentials, including dumping/restoring volume contents and manipulating the backup database. For example, an unauthenticated attacker can replace any volume's content with arbitrary data.</Note>
    </Notes>
    <CVE>CVE-2018-16947</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openafs-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-authlibs-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-authlibs-devel-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-client-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-devel-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-fuse_client-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-kernel-source-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-kmp-default-1.8.8_k5.14.6_1-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-server-1.8.8-1.13</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16947.html</URL>
        <Description>CVE-2018-16947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108153</URL>
        <Description>SUSE Bug 1108153</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several RPC server routines did not fully initialize their output variables before returning, leaking memory contents from both the stack and the heap. Because the OpenAFS cache manager functions as an Rx server for the AFSCB service, clients are also susceptible to information leakage. For example, RXAFSCB_TellMeAboutYourself leaks kernel memory and KAM_ListEntry leaks kaserver memory.</Note>
    </Notes>
    <CVE>CVE-2018-16948</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openafs-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-authlibs-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-authlibs-devel-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-client-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-devel-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-fuse_client-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-kernel-source-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-kmp-default-1.8.8_k5.14.6_1-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-server-1.8.8-1.13</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16948.html</URL>
        <Description>CVE-2018-16948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108154</URL>
        <Description>SUSE Bug 1108154</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several data types used as RPC input variables were implemented as unbounded array types, limited only by the inherent 32-bit length field to 4 GB. An unauthenticated attacker could send, or claim to send, large input values and consume server resources waiting for those inputs, denying service to other valid connections.</Note>
    </Notes>
    <CVE>CVE-2018-16949</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openafs-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-authlibs-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-authlibs-devel-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-client-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-devel-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-fuse_client-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-kernel-source-1.8.8-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-kmp-default-1.8.8_k5.14.6_1-1.13</ProductID>
        <ProductID>openSUSE Tumbleweed:openafs-server-1.8.8-1.13</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16949.html</URL>
        <Description>CVE-2018-16949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108155</URL>
        <Description>SUSE Bug 1108155</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
