<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libsystemd0-249.4-2.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11420-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libsystemd0-249.4-2.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libsystemd0-249.4-2.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11420</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10156/</URL>
      <Description>SUSE CVE CVE-2016-10156 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15908/</URL>
      <Description>SUSE CVE CVE-2017-15908 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-18078/</URL>
      <Description>SUSE CVE CVE-2017-18078 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9445/</URL>
      <Description>SUSE CVE CVE-2017-9445 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15686/</URL>
      <Description>SUSE CVE CVE-2018-15686 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15687/</URL>
      <Description>SUSE CVE CVE-2018-15687 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15688/</URL>
      <Description>SUSE CVE CVE-2018-15688 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16864/</URL>
      <Description>SUSE CVE CVE-2018-16864 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16865/</URL>
      <Description>SUSE CVE CVE-2018-16865 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-21029/</URL>
      <Description>SUSE CVE CVE-2018-21029 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6954/</URL>
      <Description>SUSE CVE CVE-2018-6954 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20386/</URL>
      <Description>SUSE CVE CVE-2019-20386 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3842/</URL>
      <Description>SUSE CVE CVE-2019-3842 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3843/</URL>
      <Description>SUSE CVE CVE-2019-3843 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3844/</URL>
      <Description>SUSE CVE CVE-2019-3844 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6454/</URL>
      <Description>SUSE CVE CVE-2019-6454 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13529/</URL>
      <Description>SUSE CVE CVE-2020-13529 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-1712/</URL>
      <Description>SUSE CVE CVE-2020-1712 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-33910/</URL>
      <Description>SUSE CVE CVE-2021-33910 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libsystemd0-249.4-2.2">
      <FullProductName ProductID="libsystemd0-249.4-2.2">libsystemd0-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsystemd0-32bit-249.4-2.2">
      <FullProductName ProductID="libsystemd0-32bit-249.4-2.2">libsystemd0-32bit-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libudev-devel-249.4-2.2">
      <FullProductName ProductID="libudev-devel-249.4-2.2">libudev-devel-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libudev-devel-32bit-249.4-2.2">
      <FullProductName ProductID="libudev-devel-32bit-249.4-2.2">libudev-devel-32bit-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libudev1-249.4-2.2">
      <FullProductName ProductID="libudev1-249.4-2.2">libudev1-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libudev1-32bit-249.4-2.2">
      <FullProductName ProductID="libudev1-32bit-249.4-2.2">libudev1-32bit-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nss-myhostname-249.4-2.2">
      <FullProductName ProductID="nss-myhostname-249.4-2.2">nss-myhostname-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nss-myhostname-32bit-249.4-2.2">
      <FullProductName ProductID="nss-myhostname-32bit-249.4-2.2">nss-myhostname-32bit-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nss-mymachines-249.4-2.2">
      <FullProductName ProductID="nss-mymachines-249.4-2.2">nss-mymachines-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nss-mymachines-32bit-249.4-2.2">
      <FullProductName ProductID="nss-mymachines-32bit-249.4-2.2">nss-mymachines-32bit-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nss-resolve-249.4-2.2">
      <FullProductName ProductID="nss-resolve-249.4-2.2">nss-resolve-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nss-systemd-249.4-2.2">
      <FullProductName ProductID="nss-systemd-249.4-2.2">nss-systemd-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-249.4-2.2">
      <FullProductName ProductID="systemd-249.4-2.2">systemd-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-32bit-249.4-2.2">
      <FullProductName ProductID="systemd-32bit-249.4-2.2">systemd-32bit-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-container-249.4-2.2">
      <FullProductName ProductID="systemd-container-249.4-2.2">systemd-container-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-coredump-249.4-2.2">
      <FullProductName ProductID="systemd-coredump-249.4-2.2">systemd-coredump-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-devel-249.4-2.2">
      <FullProductName ProductID="systemd-devel-249.4-2.2">systemd-devel-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-doc-249.4-2.2">
      <FullProductName ProductID="systemd-doc-249.4-2.2">systemd-doc-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-experimental-249.4-2.2">
      <FullProductName ProductID="systemd-experimental-249.4-2.2">systemd-experimental-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-journal-remote-249.4-2.2">
      <FullProductName ProductID="systemd-journal-remote-249.4-2.2">systemd-journal-remote-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-lang-249.4-2.2">
      <FullProductName ProductID="systemd-lang-249.4-2.2">systemd-lang-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-logger-249.4-2.2">
      <FullProductName ProductID="systemd-logger-249.4-2.2">systemd-logger-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-network-249.4-2.2">
      <FullProductName ProductID="systemd-network-249.4-2.2">systemd-network-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-portable-249.4-2.2">
      <FullProductName ProductID="systemd-portable-249.4-2.2">systemd-portable-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-sysvinit-249.4-2.2">
      <FullProductName ProductID="systemd-sysvinit-249.4-2.2">systemd-sysvinit-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-testsuite-249.4-2.2">
      <FullProductName ProductID="systemd-testsuite-249.4-2.2">systemd-testsuite-249.4-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="udev-249.4-2.2">
      <FullProductName ProductID="udev-249.4-2.2">udev-249.4-2.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libsystemd0-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsystemd0-249.4-2.2">libsystemd0-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsystemd0-32bit-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2">libsystemd0-32bit-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libudev-devel-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libudev-devel-249.4-2.2">libudev-devel-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libudev-devel-32bit-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2">libudev-devel-32bit-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libudev1-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libudev1-249.4-2.2">libudev1-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libudev1-32bit-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libudev1-32bit-249.4-2.2">libudev1-32bit-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nss-myhostname-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nss-myhostname-249.4-2.2">nss-myhostname-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nss-myhostname-32bit-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2">nss-myhostname-32bit-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nss-mymachines-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nss-mymachines-249.4-2.2">nss-mymachines-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nss-mymachines-32bit-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2">nss-mymachines-32bit-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nss-resolve-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nss-resolve-249.4-2.2">nss-resolve-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nss-systemd-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nss-systemd-249.4-2.2">nss-systemd-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-249.4-2.2">systemd-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-32bit-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-32bit-249.4-2.2">systemd-32bit-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-container-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-container-249.4-2.2">systemd-container-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-coredump-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-coredump-249.4-2.2">systemd-coredump-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-devel-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-devel-249.4-2.2">systemd-devel-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-doc-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-doc-249.4-2.2">systemd-doc-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-experimental-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-experimental-249.4-2.2">systemd-experimental-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-journal-remote-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2">systemd-journal-remote-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-lang-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-lang-249.4-2.2">systemd-lang-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-logger-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-logger-249.4-2.2">systemd-logger-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-network-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-network-249.4-2.2">systemd-network-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-portable-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-portable-249.4-2.2">systemd-portable-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-sysvinit-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2">systemd-sysvinit-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-testsuite-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:systemd-testsuite-249.4-2.2">systemd-testsuite-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="udev-249.4-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:udev-249.4-2.2">udev-249.4-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.</Note>
    </Notes>
    <CVE>CVE-2016-10156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10156.html</URL>
        <Description>CVE-2016-10156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020601</URL>
        <Description>SUSE Bug 1020601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021969</URL>
        <Description>SUSE Bug 1021969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086936</URL>
        <Description>SUSE Bug 1086936</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.</Note>
    </Notes>
    <CVE>CVE-2017-15908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15908.html</URL>
        <Description>CVE-2017-15908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1065276</URL>
        <Description>SUSE Bug 1065276</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.</Note>
    </Notes>
    <CVE>CVE-2017-18078</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18078.html</URL>
        <Description>CVE-2017-18078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077925</URL>
        <Description>SUSE Bug 1077925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.</Note>
    </Notes>
    <CVE>CVE-2017-9445</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9445.html</URL>
        <Description>CVE-2017-9445</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045290</URL>
        <Description>SUSE Bug 1045290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063249</URL>
        <Description>SUSE Bug 1063249</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.</Note>
    </Notes>
    <CVE>CVE-2018-15686</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15686.html</URL>
        <Description>CVE-2018-15686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113665</URL>
        <Description>SUSE Bug 1113665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120323</URL>
        <Description>SUSE Bug 1120323</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A race condition in chown_one() of systemd allows an attacker to cause systemd to set arbitrary permissions on arbitrary files. Affected releases are systemd versions up to and including 239.</Note>
    </Notes>
    <CVE>CVE-2018-15687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15687.html</URL>
        <Description>CVE-2018-15687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113666</URL>
        <Description>SUSE Bug 1113666</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.</Note>
    </Notes>
    <CVE>CVE-2018-15688</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15688.html</URL>
        <Description>CVE-2018-15688</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113632</URL>
        <Description>SUSE Bug 1113632</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113668</URL>
        <Description>SUSE Bug 1113668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113669</URL>
        <Description>SUSE Bug 1113669</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.</Note>
    </Notes>
    <CVE>CVE-2018-16864</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16864.html</URL>
        <Description>CVE-2018-16864</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108912</URL>
        <Description>SUSE Bug 1108912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120323</URL>
        <Description>SUSE Bug 1120323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122265</URL>
        <Description>SUSE Bug 1122265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188063</URL>
        <Description>SUSE Bug 1188063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.</Note>
    </Notes>
    <CVE>CVE-2018-16865</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16865.html</URL>
        <Description>CVE-2018-16865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108912</URL>
        <Description>SUSE Bug 1108912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120323</URL>
        <Description>SUSE Bug 1120323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122265</URL>
        <Description>SUSE Bug 1122265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188063</URL>
        <Description>SUSE Bug 1188063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent).</Note>
    </Notes>
    <CVE>CVE-2018-21029</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-21029.html</URL>
        <Description>CVE-2018-21029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155539</URL>
        <Description>SUSE Bug 1155539</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on.</Note>
    </Notes>
    <CVE>CVE-2018-6954</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6954.html</URL>
        <Description>CVE-2018-6954</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080919</URL>
        <Description>SUSE Bug 1080919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.</Note>
    </Notes>
    <CVE>CVE-2019-20386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20386.html</URL>
        <Description>CVE-2019-20386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161436</URL>
        <Description>SUSE Bug 1161436</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".</Note>
    </Notes>
    <CVE>CVE-2019-3842</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3842.html</URL>
        <Description>CVE-2019-3842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132348</URL>
        <Description>SUSE Bug 1132348</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.</Note>
    </Notes>
    <CVE>CVE-2019-3843</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3843.html</URL>
        <Description>CVE-2019-3843</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133506</URL>
        <Description>SUSE Bug 1133506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.</Note>
    </Notes>
    <CVE>CVE-2019-3844</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3844.html</URL>
        <Description>CVE-2019-3844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133509</URL>
        <Description>SUSE Bug 1133509</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).</Note>
    </Notes>
    <CVE>CVE-2019-6454</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6454.html</URL>
        <Description>CVE-2019-6454</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125352</URL>
        <Description>SUSE Bug 1125352</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.</Note>
    </Notes>
    <CVE>CVE-2020-13529</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13529.html</URL>
        <Description>CVE-2020-13529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185972</URL>
        <Description>SUSE Bug 1185972</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.</Note>
    </Notes>
    <CVE>CVE-2020-1712</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-1712.html</URL>
        <Description>CVE-2020-1712</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162108</URL>
        <Description>SUSE Bug 1162108</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.</Note>
    </Notes>
    <CVE>CVE-2021-33910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsystemd0-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libudev1-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-resolve-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nss-systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-32bit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-container-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-coredump-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-devel-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-doc-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-experimental-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-lang-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-logger-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-network-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-portable-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:systemd-testsuite-249.4-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:udev-249.4-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-33910.html</URL>
        <Description>CVE-2021-33910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188062</URL>
        <Description>SUSE Bug 1188062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188063</URL>
        <Description>SUSE Bug 1188063</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
