{"affected":[{"ecosystem_specific":{"binaries":[{"res-signingkeys":"3.0.37-52.23.6","smt":"3.0.37-52.23.6","smt-support":"3.0.37-52.23.6"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"smt","purl":"pkg:rpm/suse/smt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.37-52.23.6"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for yast2-smt to 3.0.14 and smt to 3.0.37 fixes the following issues:\n\nThese security issues were fixed in SMT:\n\n- CVE-2018-12471: Xml External Entity processing in the RegistrationSharing\n  modules allowed to read arbitrary file read (bsc#1103809).\n- CVE-2018-12470: SQL injection in RegistrationSharing module allows remote\n  attackers to run arbitrary SQL statements (bsc#1103810).\n- CVE-2018-12472: Authentication bypass in sibling check facilitated further\n  attacks on SMT (bsc#1104076).\n\nSUSE would like to thank Jake Miller for reporting these issues to us.\n\nThese non-security issues were fixed in SMT:\n\n- Fix cron jobs randomization (bsc#1097560)\n- Fix duplicate migration paths (bsc#1097824)\n\nThis non-security issue was fixed in yast2-smt:\n\n- Remove cron job rescheduling (bsc#1097560)\n- Added missing translation marks (bsc#1037811)\n- Explicitly mention 'Organization Credentials' (fate#321759)\n- Rearrange the SMT set-up dialog (bsc#977043)\n- Make the Filter button default (bsc#1006984)\n- Prevent exiting the repo selection dialog via hitting Enter in\n  the repository filter (bsc#1006984)\n- report when error occurs during repo mirroring (bsc#1006989)\n- Use TextEntry-based filter for repos (fate#319777)\n","id":"SUSE-SU-2018:2898-2","modified":"2018-10-18T12:49:39Z","published":"2018-10-18T12:49:39Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20182898-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1006984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1006989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1037811"},{"type":"REPORT","url":"https://bugzilla.suse.com/1097560"},{"type":"REPORT","url":"https://bugzilla.suse.com/1097824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1103809"},{"type":"REPORT","url":"https://bugzilla.suse.com/1103810"},{"type":"REPORT","url":"https://bugzilla.suse.com/1104076"},{"type":"REPORT","url":"https://bugzilla.suse.com/977043"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12470"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12471"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12472"}],"related":["CVE-2018-12470","CVE-2018-12471","CVE-2018-12472"],"summary":"Security update for smt, yast2-smt","upstream":["CVE-2018-12470","CVE-2018-12471","CVE-2018-12472"]}