<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for curl</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:0861-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-04-29T12:30:27Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-04-29T12:30:27Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-04-29T12:30:27Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for curl</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">curl was updated to 7.42.1 to fix one security issue.

The following vulnerability was fixed:

* CVE-2015-3153: curl could have sent sensitive HTTP headers also to proxies (bnc#928533)</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:0861-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="curl-7.42.1-2.42.1">
      <FullProductName ProductID="curl-7.42.1-2.42.1">curl-7.42.1-2.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-7.42.1-2.42.1">
      <FullProductName ProductID="libcurl-devel-7.42.1-2.42.1">libcurl-devel-7.42.1-2.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-32bit-7.42.1-2.42.1">
      <FullProductName ProductID="libcurl-devel-32bit-7.42.1-2.42.1">libcurl-devel-32bit-7.42.1-2.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-7.42.1-2.42.1">
      <FullProductName ProductID="libcurl4-7.42.1-2.42.1">libcurl4-7.42.1-2.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-7.42.1-2.42.1">
      <FullProductName ProductID="libcurl4-32bit-7.42.1-2.42.1">libcurl4-32bit-7.42.1-2.42.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.</Note>
    </Notes>
    <CVE>CVE-2015-3153</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3153.html</URL>
        <Description>CVE-2015-3153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928533</URL>
        <Description>SUSE Bug 928533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
