<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for curl</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2379-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-09-25T20:38:19Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-09-25T20:38:19Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-09-25T20:38:19Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for curl</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for curl fixes the following issues:

Security issues fixed:
- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-5421: use of connection struct after free (bsc#991391)
- CVE-2016-7141: Fixed incorrect reuse of client certificates with NSS (bsc#997420)

Also the following bug was fixed:
- fixing a performance issue (bsc#991746)

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2379-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="curl-7.37.0-13.1">
      <FullProductName ProductID="curl-7.37.0-13.1">curl-7.37.0-13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-7.37.0-13.1">
      <FullProductName ProductID="libcurl-devel-7.37.0-13.1">libcurl-devel-7.37.0-13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-32bit-7.37.0-13.1">
      <FullProductName ProductID="libcurl-devel-32bit-7.37.0-13.1">libcurl-devel-32bit-7.37.0-13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-7.37.0-13.1">
      <FullProductName ProductID="libcurl4-7.37.0-13.1">libcurl4-7.37.0-13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-7.37.0-13.1">
      <FullProductName ProductID="libcurl4-32bit-7.37.0-13.1">libcurl4-32bit-7.37.0-13.1</FullProductName>
    </Branch>
    <Relationship ProductReference="curl-7.37.0-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:curl-7.37.0-13.1">curl-7.37.0-13.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-7.37.0-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libcurl-devel-7.37.0-13.1">libcurl-devel-7.37.0-13.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-32bit-7.37.0-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-13.1">libcurl-devel-32bit-7.37.0-13.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-7.37.0-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libcurl4-7.37.0-13.1">libcurl4-7.37.0-13.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-7.37.0-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libcurl4-32bit-7.37.0-13.1">libcurl4-32bit-7.37.0-13.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.</Note>
    </Notes>
    <CVE>CVE-2016-5419</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5419.html</URL>
        <Description>CVE-2016-5419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033413</URL>
        <Description>SUSE Bug 1033413</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033442</URL>
        <Description>SUSE Bug 1033442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991389</URL>
        <Description>SUSE Bug 991389</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.</Note>
    </Notes>
    <CVE>CVE-2016-5420</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5420.html</URL>
        <Description>CVE-2016-5420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991390</URL>
        <Description>SUSE Bug 991390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/997420</URL>
        <Description>SUSE Bug 997420</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-5421</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5421.html</URL>
        <Description>CVE-2016-5421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991391</URL>
        <Description>SUSE Bug 991391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.</Note>
    </Notes>
    <CVE>CVE-2016-7141</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7141.html</URL>
        <Description>CVE-2016-7141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991390</URL>
        <Description>SUSE Bug 991390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/997420</URL>
        <Description>SUSE Bug 997420</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
