<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libtcnative-1-0</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2019:14014-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-04-09T09:17:42Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-04-09T09:17:42Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-04-09T09:17:42Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libtcnative-1-0</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libtcnative-1-0 to version 1.1.34 fixes the following issues:

- CVE-2017-15698: Fixed an improper handling of fields with more than 127 bytes 
  which could allow invalid client certificates to be accepted (bsc#1078679).
- CVE-2018-8019: When using an OCSP responder did not correctly handle invalid
  responses. This allowed for revoked client certificates to be incorrectly
  identified. It was therefore possible for users to authenticate with revoked
  certificates when using mutual TLS (bsc#1103348).
- CVE-2018-8020: Did not properly check OCSP pre-produced responses. Revoked
  client certificates may have not been properly identified, allowing for users
  to authenticate with revoked certificates to connections that require mutual
  TLS (bsc#1103347).

For a complete list of changes please see
http://tomcat.apache.org/native-1.1-doc/miscellaneous/changelog.html
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sleposp3-libtcnative-1-0-14014,slessp4-libtcnative-1-0-14014</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2019/suse-su-201914014-1/</URL>
      <Description>Link for SUSE-SU-2019:14014-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2019-April/005314.html</URL>
      <Description>E-Mail link for SUSE-SU-2019:14014-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1078679</URL>
      <Description>SUSE Bug 1078679</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1103347</URL>
      <Description>SUSE Bug 1103347</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1103348</URL>
      <Description>SUSE Bug 1103348</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15698/</URL>
      <Description>SUSE CVE CVE-2017-15698 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-8019/</URL>
      <Description>SUSE CVE CVE-2018-8019 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-8020/</URL>
      <Description>SUSE CVE CVE-2018-8020 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3" CPE="cpe:/o:suse:sle-pos:11:sp3">SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libtcnative-1-0-1.3.4-12.5.5.2">
      <FullProductName ProductID="libtcnative-1-0-1.3.4-12.5.5.2">libtcnative-1-0-1.3.4-12.5.5.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libtcnative-1-0-1.3.4-12.5.5.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:libtcnative-1-0-1.3.4-12.5.5.2">libtcnative-1-0-1.3.4-12.5.5.2 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtcnative-1-0-1.3.4-12.5.5.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:libtcnative-1-0-1.3.4-12.5.5.2">libtcnative-1-0-1.3.4-12.5.5.2 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When parsing the AIA-Extension field of a client certificate, Apache Tomcat Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not correctly handle fields longer than 127 bytes. The result of the parsing error was to skip the OCSP check. It was therefore possible for client certificates that should have been rejected (if the OCSP check had been made) to be accepted. Users not using OCSP checks are not affected by this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2017-15698</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libtcnative-1-0-1.3.4-12.5.5.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libtcnative-1-0-1.3.4-12.5.5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-201914014-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15698.html</URL>
        <Description>CVE-2017-15698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078679</URL>
        <Description>SUSE Bug 1078679</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When using an OCSP responder Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 did not correctly handle invalid responses. This allowed for revoked client certificates to be incorrectly identified. It was therefore possible for users to authenticate with revoked certificates when using mutual TLS. Users not using OCSP checks are not affected by this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2018-8019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libtcnative-1-0-1.3.4-12.5.5.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libtcnative-1-0-1.3.4-12.5.5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-201914014-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8019.html</URL>
        <Description>CVE-2018-8019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103348</URL>
        <Description>SUSE Bug 1103348</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 has a flaw that does not properly check OCSP pre-produced responses, which are lists (multiple entries) of certificate statuses. Subsequently, revoked client certificates may not be properly identified, allowing for users to authenticate with revoked certificates to connections that require mutual TLS. Users not using OCSP checks are not affected by this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2018-8020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libtcnative-1-0-1.3.4-12.5.5.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libtcnative-1-0-1.3.4-12.5.5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-201914014-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8020.html</URL>
        <Description>CVE-2018-8020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103347</URL>
        <Description>SUSE Bug 1103347</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
