<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for sddm</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:2310-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-08-13T08:09:03Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-08-13T08:09:03Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-08-13T08:09:03Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for sddm</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for sddm fixes the following issues:

The following security vulnerability was addressed:

- CVE-2018-14345: Fixed the authentication, which did not check the password
  for users with an already existing session and allowed any user with access
  to the system bus to unlock any graphical session. (boo#1101450)

The following other bugs were addressed:

- Fallback to embedded theme, if none is set
- Corrected section name for Wayland
- Removed patch, which is no longer needed, because bug in libxcb was fixed
  in the meanwhile (boo#1099908)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00047.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:2310-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="sddm-0.17.0-lp150.9.3.1">
      <FullProductName ProductID="sddm-0.17.0-lp150.9.3.1">sddm-0.17.0-lp150.9.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sddm-branding-openSUSE-0.17.0-lp150.9.3.1">
      <FullProductName ProductID="sddm-branding-openSUSE-0.17.0-lp150.9.3.1">sddm-branding-openSUSE-0.17.0-lp150.9.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sddm-branding-upstream-0.17.0-lp150.9.3.1">
      <FullProductName ProductID="sddm-branding-upstream-0.17.0-lp150.9.3.1">sddm-branding-upstream-0.17.0-lp150.9.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="sddm-0.17.0-lp150.9.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:sddm-0.17.0-lp150.9.3.1">sddm-0.17.0-lp150.9.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="sddm-branding-openSUSE-0.17.0-lp150.9.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:sddm-branding-openSUSE-0.17.0-lp150.9.3.1">sddm-branding-openSUSE-0.17.0-lp150.9.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="sddm-branding-upstream-0.17.0-lp150.9.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:sddm-branding-upstream-0.17.0-lp150.9.3.1">sddm-branding-upstream-0.17.0-lp150.9.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.</Note>
    </Notes>
    <CVE>CVE-2018-14345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:sddm-0.17.0-lp150.9.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:sddm-branding-openSUSE-0.17.0-lp150.9.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:sddm-branding-upstream-0.17.0-lp150.9.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00047.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14345.html</URL>
        <Description>CVE-2018-14345</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
