<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libxmltooling-devel-3.2.0-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11523</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libxmltooling-devel-3.2.0-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libxmltooling-devel-3.2.0-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11523</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11523</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-0486/</URL>
      <Description>SUSE CVE CVE-2018-0486 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-0489/</URL>
      <Description>SUSE CVE CVE-2018-0489 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9628/</URL>
      <Description>SUSE CVE CVE-2019-9628 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libxmltooling-devel-3.2.0-1.2">
      <FullProductName ProductID="libxmltooling-devel-3.2.0-1.2">libxmltooling-devel-3.2.0-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxmltooling-lite10-3.2.0-1.2">
      <FullProductName ProductID="libxmltooling-lite10-3.2.0-1.2">libxmltooling-lite10-3.2.0-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxmltooling10-3.2.0-1.2">
      <FullProductName ProductID="libxmltooling10-3.2.0-1.2">libxmltooling10-3.2.0-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xmltooling-schemas-3.2.0-1.2">
      <FullProductName ProductID="xmltooling-schemas-3.2.0-1.2">xmltooling-schemas-3.2.0-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libxmltooling-devel-3.2.0-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libxmltooling-devel-3.2.0-1.2">libxmltooling-devel-3.2.0-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxmltooling-lite10-3.2.0-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libxmltooling-lite10-3.2.0-1.2">libxmltooling-lite10-3.2.0-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxmltooling10-3.2.0-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libxmltooling10-3.2.0-1.2">libxmltooling10-3.2.0-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xmltooling-schemas-3.2.0-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xmltooling-schemas-3.2.0-1.2">xmltooling-schemas-3.2.0-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Shibboleth XMLTooling-C before 1.6.3, as used in Shibboleth Service Provider before 2.6.0 on Windows and other products, mishandles digital signatures of user attribute data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via a crafted DTD.</Note>
    </Notes>
    <CVE>CVE-2018-0486</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxmltooling-devel-3.2.0-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libxmltooling-lite10-3.2.0-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libxmltooling10-3.2.0-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xmltooling-schemas-3.2.0-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0486.html</URL>
        <Description>CVE-2018-0486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075975</URL>
        <Description>SUSE Bug 1075975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083247</URL>
        <Description>SUSE Bug 1083247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Shibboleth XMLTooling-C before 1.6.4, as used in Shibboleth Service Provider before 2.6.1.4 on Windows and other products, mishandles digital signatures of user data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via crafted XML data. NOTE: this issue exists because of an incomplete fix for CVE-2018-0486.</Note>
    </Notes>
    <CVE>CVE-2018-0489</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxmltooling-devel-3.2.0-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libxmltooling-lite10-3.2.0-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libxmltooling10-3.2.0-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xmltooling-schemas-3.2.0-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0489.html</URL>
        <Description>CVE-2018-0489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083247</URL>
        <Description>SUSE Bug 1083247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The XMLTooling library all versions prior to V3.0.4, provided with the OpenSAML and Shibboleth Service Provider software, contains an XML parsing class. Invalid data in the XML declaration causes an exception of a type that was not handled properly in the parser class and propagates an unexpected exception type.</Note>
    </Notes>
    <CVE>CVE-2019-9628</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libxmltooling-devel-3.2.0-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libxmltooling-lite10-3.2.0-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libxmltooling10-3.2.0-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xmltooling-schemas-3.2.0-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9628.html</URL>
        <Description>CVE-2019-9628</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1129537</URL>
        <Description>SUSE Bug 1129537</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
