<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for tryton</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:4242-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-12-22T12:28:06Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-12-22T12:28:06Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-12-22T12:28:06Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for tryton</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for tryton to version 4.2.19 fixes the following issues:

Security issue fixed:

- CVE-2018-19443: Fixed an information leakage by attemping to initiate an
  unencrypted connection, which would fail eventually, but might leak session
  information of the user (boo#1117105)

This update also contains newer versions of tryton related packages with general bug fixes and updates:
    
- trytond 4.2.17
- trytond_account 4.2.10
- trytond_account_invoice 4.2.7
- trytond_purchase_request 4.2.4
- trytond_stock 4.2.8
- trytond_stock_supply 4.2.3 
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00056.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:4242-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub for SUSE Linux Enterprise 15">
      <Branch Type="Product Name" Name="SUSE Package Hub for SUSE Linux Enterprise 15">
        <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15">SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="tryton-4.2.19-bp150.2.6.1">
      <FullProductName ProductID="tryton-4.2.19-bp150.2.6.1">tryton-4.2.19-bp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="trytond-4.2.17-bp150.2.6.1">
      <FullProductName ProductID="trytond-4.2.17-bp150.2.6.1">trytond-4.2.17-bp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="trytond_account-4.2.10-bp150.3.3.1">
      <FullProductName ProductID="trytond_account-4.2.10-bp150.3.3.1">trytond_account-4.2.10-bp150.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="trytond_account_invoice-4.2.7-bp150.3.3.1">
      <FullProductName ProductID="trytond_account_invoice-4.2.7-bp150.3.3.1">trytond_account_invoice-4.2.7-bp150.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="trytond_purchase_request-4.2.4-bp150.3.3.1">
      <FullProductName ProductID="trytond_purchase_request-4.2.4-bp150.3.3.1">trytond_purchase_request-4.2.4-bp150.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="trytond_stock-4.2.8-bp150.3.3.1">
      <FullProductName ProductID="trytond_stock-4.2.8-bp150.3.3.1">trytond_stock-4.2.8-bp150.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="trytond_stock_supply-4.2.3-bp150.3.6.1">
      <FullProductName ProductID="trytond_stock_supply-4.2.3-bp150.3.6.1">trytond_stock_supply-4.2.3-bp150.3.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="tryton-4.2.19-bp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub for SUSE Linux Enterprise 15">
      <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15:tryton-4.2.19-bp150.2.6.1">tryton-4.2.19-bp150.2.6.1 as a component of SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="trytond-4.2.17-bp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub for SUSE Linux Enterprise 15">
      <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15:trytond-4.2.17-bp150.2.6.1">trytond-4.2.17-bp150.2.6.1 as a component of SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="trytond_account-4.2.10-bp150.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub for SUSE Linux Enterprise 15">
      <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15:trytond_account-4.2.10-bp150.3.3.1">trytond_account-4.2.10-bp150.3.3.1 as a component of SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="trytond_account_invoice-4.2.7-bp150.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub for SUSE Linux Enterprise 15">
      <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15:trytond_account_invoice-4.2.7-bp150.3.3.1">trytond_account_invoice-4.2.7-bp150.3.3.1 as a component of SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="trytond_purchase_request-4.2.4-bp150.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub for SUSE Linux Enterprise 15">
      <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15:trytond_purchase_request-4.2.4-bp150.3.3.1">trytond_purchase_request-4.2.4-bp150.3.3.1 as a component of SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="trytond_stock-4.2.8-bp150.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub for SUSE Linux Enterprise 15">
      <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15:trytond_stock-4.2.8-bp150.3.3.1">trytond_stock-4.2.8-bp150.3.3.1 as a component of SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="trytond_stock_supply-4.2.3-bp150.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub for SUSE Linux Enterprise 15">
      <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15:trytond_stock_supply-4.2.3-bp150.3.6.1">trytond_stock_supply-4.2.3-bp150.3.6.1 as a component of SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.</Note>
    </Notes>
    <CVE>CVE-2018-19443</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:tryton-4.2.19-bp150.2.6.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:trytond-4.2.17-bp150.2.6.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:trytond_account-4.2.10-bp150.3.3.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:trytond_account_invoice-4.2.7-bp150.3.3.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:trytond_purchase_request-4.2.4-bp150.3.3.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:trytond_stock-4.2.8-bp150.3.3.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:trytond_stock_supply-4.2.3-bp150.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00056.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19443.html</URL>
        <Description>CVE-2018-19443</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117105</URL>
        <Description>SUSE Bug 1117105</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
