<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libfpm_pb0-1.2.4-2.14 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11290-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libfpm_pb0-1.2.4-2.14 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libfpm_pb0-1.2.4-2.14 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11290</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-2223/</URL>
      <Description>SUSE CVE CVE-2006-2223 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-1995/</URL>
      <Description>SUSE CVE CVE-2007-1995 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16227/</URL>
      <Description>SUSE CVE CVE-2017-16227 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5495/</URL>
      <Description>SUSE CVE CVE-2017-5495 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5278/</URL>
      <Description>SUSE CVE CVE-2018-5278 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5279/</URL>
      <Description>SUSE CVE CVE-2018-5279 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5280/</URL>
      <Description>SUSE CVE CVE-2018-5280 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5281/</URL>
      <Description>SUSE CVE CVE-2018-5281 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5378/</URL>
      <Description>SUSE CVE CVE-2018-5378 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5379/</URL>
      <Description>SUSE CVE CVE-2018-5379 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5380/</URL>
      <Description>SUSE CVE CVE-2018-5380 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5381/</URL>
      <Description>SUSE CVE CVE-2018-5381 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libfpm_pb0-1.2.4-2.14">
      <FullProductName ProductID="libfpm_pb0-1.2.4-2.14">libfpm_pb0-1.2.4-2.14</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libospf0-1.2.4-2.14">
      <FullProductName ProductID="libospf0-1.2.4-2.14">libospf0-1.2.4-2.14</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libospfapiclient0-1.2.4-2.14">
      <FullProductName ProductID="libospfapiclient0-1.2.4-2.14">libospfapiclient0-1.2.4-2.14</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libquagga_pb0-1.2.4-2.14">
      <FullProductName ProductID="libquagga_pb0-1.2.4-2.14">libquagga_pb0-1.2.4-2.14</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libzebra1-1.2.4-2.14">
      <FullProductName ProductID="libzebra1-1.2.4-2.14">libzebra1-1.2.4-2.14</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="quagga-1.2.4-2.14">
      <FullProductName ProductID="quagga-1.2.4-2.14">quagga-1.2.4-2.14</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="quagga-devel-1.2.4-2.14">
      <FullProductName ProductID="quagga-devel-1.2.4-2.14">quagga-devel-1.2.4-2.14</FullProductName>
    </Branch>
    <Relationship ProductReference="libfpm_pb0-1.2.4-2.14" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libfpm_pb0-1.2.4-2.14">libfpm_pb0-1.2.4-2.14 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libospf0-1.2.4-2.14" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libospf0-1.2.4-2.14">libospf0-1.2.4-2.14 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libospfapiclient0-1.2.4-2.14" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libospfapiclient0-1.2.4-2.14">libospfapiclient0-1.2.4-2.14 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libquagga_pb0-1.2.4-2.14" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libquagga_pb0-1.2.4-2.14">libquagga_pb0-1.2.4-2.14 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libzebra1-1.2.4-2.14" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libzebra1-1.2.4-2.14">libzebra1-1.2.4-2.14 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="quagga-1.2.4-2.14" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:quagga-1.2.4-2.14">quagga-1.2.4-2.14 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="quagga-devel-1.2.4-2.14" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:quagga-devel-1.2.4-2.14">quagga-devel-1.2.4-2.14 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.</Note>
    </Notes>
    <CVE>CVE-2006-2223</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfpm_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospf0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospfapiclient0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libquagga_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libzebra1-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-devel-1.2.4-2.14</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-2223.html</URL>
        <Description>CVE-2006-2223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/173828</URL>
        <Description>SUSE Bug 173828</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">bgpd/bgp_attr.c in Quagga 0.98.6 and earlier, and 0.99.6 and earlier 0.99 versions, does not validate length values in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes, which allows remote attackers to cause a denial of service (daemon crash or exit) via crafted UPDATE messages that trigger an assertion error or out of bounds read.</Note>
    </Notes>
    <CVE>CVE-2007-1995</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfpm_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospf0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospfapiclient0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libquagga_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libzebra1-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-devel-1.2.4-2.14</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.3</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-1995.html</URL>
        <Description>CVE-2007-1995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/266100</URL>
        <Description>SUSE Bug 266100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The aspath_put function in bgpd/bgp_aspath.c in Quagga before 1.2.2 allows remote attackers to cause a denial of service (session drop) via BGP UPDATE messages, because AS_PATH size calculation for long paths counts certain bytes twice and consequently constructs an invalid message.</Note>
    </Notes>
    <CVE>CVE-2017-16227</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfpm_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospf0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospfapiclient0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libquagga_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libzebra1-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-devel-1.2.4-2.14</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16227.html</URL>
        <Description>CVE-2017-16227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1065641</URL>
        <Description>SUSE Bug 1065641</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded memory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service of Quagga daemons, or even the entire host. When Quagga daemons are configured with their telnet CLI enabled, anyone who can connect to the TCP ports can trigger this vulnerability, prior to authentication. Most distributions restrict the Quagga telnet interface to local access only by default. The Quagga telnet interface 'vty' input buffer grows automatically, without bound, so long as a newline is not entered. This allows an attacker to cause the Quagga daemon to allocate unbounded memory by sending very long strings without a newline. Eventually the daemon is terminated by the system, or the system itself runs out of memory. This is fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite 2017-01-10.</Note>
    </Notes>
    <CVE>CVE-2017-5495</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfpm_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospf0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospfapiclient0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libquagga_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libzebra1-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-devel-1.2.4-2.14</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5495.html</URL>
        <Description>CVE-2017-5495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021669</URL>
        <Description>SUSE Bug 1021669</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e00c. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit)."</Note>
    </Notes>
    <CVE>CVE-2018-5278</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfpm_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospf0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospfapiclient0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libquagga_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libzebra1-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-devel-1.2.4-2.14</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5278.html</URL>
        <Description>CVE-2018-5278</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e02c. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit)."</Note>
    </Notes>
    <CVE>CVE-2018-5279</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfpm_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospf0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospfapiclient0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libquagga_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libzebra1-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-devel-1.2.4-2.14</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5279.html</URL>
        <Description>CVE-2018-5279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">SonicWall SonicOS on Network Security Appliance (NSA) 2016 Q4 devices has XSS via the Configure SSO screens.</Note>
    </Notes>
    <CVE>CVE-2018-5280</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfpm_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospf0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospfapiclient0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libquagga_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libzebra1-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-devel-1.2.4-2.14</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5280.html</URL>
        <Description>CVE-2018-5280</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">SonicWall SonicOS on Network Security Appliance (NSA) 2017 Q4 devices has XSS via the CFS Custom Category and Cloud AV DB Exclusion Settings screens.</Note>
    </Notes>
    <CVE>CVE-2018-5281</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfpm_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospf0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospfapiclient0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libquagga_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libzebra1-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-devel-1.2.4-2.14</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5281.html</URL>
        <Description>CVE-2018-5281</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.</Note>
    </Notes>
    <CVE>CVE-2018-5378</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfpm_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospf0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospfapiclient0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libquagga_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libzebra1-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-devel-1.2.4-2.14</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5378.html</URL>
        <Description>CVE-2018-5378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1079798</URL>
        <Description>SUSE Bug 1079798</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.</Note>
    </Notes>
    <CVE>CVE-2018-5379</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfpm_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospf0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospfapiclient0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libquagga_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libzebra1-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-devel-1.2.4-2.14</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5379.html</URL>
        <Description>CVE-2018-5379</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1079799</URL>
        <Description>SUSE Bug 1079799</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Quagga BGP daemon (bgpd) prior to version 1.2.3 can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.</Note>
    </Notes>
    <CVE>CVE-2018-5380</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfpm_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospf0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospfapiclient0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libquagga_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libzebra1-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-devel-1.2.4-2.14</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5380.html</URL>
        <Description>CVE-2018-5380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1079800</URL>
        <Description>SUSE Bug 1079800</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of "Capabilities" in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Protocol capability does not have a recognized AFI/SAFI, causing a denial of service.</Note>
    </Notes>
    <CVE>CVE-2018-5381</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfpm_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospf0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libospfapiclient0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libquagga_pb0-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:libzebra1-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-1.2.4-2.14</ProductID>
        <ProductID>openSUSE Tumbleweed:quagga-devel-1.2.4-2.14</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5381.html</URL>
        <Description>CVE-2018-5381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1079801</URL>
        <Description>SUSE Bug 1079801</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
