<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for curl</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2768-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-11-10T12:15:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-11-10T12:15:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-11-10T12:15:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for curl</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for curl fixes the following security issues:

- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
- CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
- CVE-2016-8622: URL unescape heap overflow via integer truncation (bsc#1005643)
- CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
- CVE-2016-8620: glob parser write/read out of bounds (bsc#1005640)
- CVE-2016-8619: double-free in krb5 code (bsc#1005638)
- CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
- CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
- CVE-2016-8616: case insensitive password comparison (bsc#1005634)
- CVE-2016-8615: cookie injection for other servers (bsc#1005633)
- CVE-2016-7167: escape and unescape integer overflows (bsc#998760)

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2768-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="curl-7.37.0-16.1">
      <FullProductName ProductID="curl-7.37.0-16.1">curl-7.37.0-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-7.37.0-16.1">
      <FullProductName ProductID="libcurl-devel-7.37.0-16.1">libcurl-devel-7.37.0-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-32bit-7.37.0-16.1">
      <FullProductName ProductID="libcurl-devel-32bit-7.37.0-16.1">libcurl-devel-32bit-7.37.0-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-7.37.0-16.1">
      <FullProductName ProductID="libcurl4-7.37.0-16.1">libcurl4-7.37.0-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-7.37.0-16.1">
      <FullProductName ProductID="libcurl4-32bit-7.37.0-16.1">libcurl4-32bit-7.37.0-16.1</FullProductName>
    </Branch>
    <Relationship ProductReference="curl-7.37.0-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:curl-7.37.0-16.1">curl-7.37.0-16.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-7.37.0-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libcurl-devel-7.37.0-16.1">libcurl-devel-7.37.0-16.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-32bit-7.37.0-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-16.1">libcurl-devel-32bit-7.37.0-16.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-7.37.0-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libcurl4-7.37.0-16.1">libcurl4-7.37.0-16.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-7.37.0-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libcurl4-32bit-7.37.0-16.1">libcurl4-32bit-7.37.0-16.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2016-7167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7167.html</URL>
        <Description>CVE-2016-7167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998760</URL>
        <Description>SUSE Bug 998760</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.</Note>
    </Notes>
    <CVE>CVE-2016-8615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8615.html</URL>
        <Description>CVE-2016-8615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005633</URL>
        <Description>SUSE Bug 1005633</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.</Note>
    </Notes>
    <CVE>CVE-2016-8616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8616.html</URL>
        <Description>CVE-2016-8616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005634</URL>
        <Description>SUSE Bug 1005634</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.</Note>
    </Notes>
    <CVE>CVE-2016-8617</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.7</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8617.html</URL>
        <Description>CVE-2016-8617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005635</URL>
        <Description>SUSE Bug 1005635</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.</Note>
    </Notes>
    <CVE>CVE-2016-8618</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8618.html</URL>
        <Description>CVE-2016-8618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005637</URL>
        <Description>SUSE Bug 1005637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.</Note>
    </Notes>
    <CVE>CVE-2016-8619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8619.html</URL>
        <Description>CVE-2016-8619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005638</URL>
        <Description>SUSE Bug 1005638</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.</Note>
    </Notes>
    <CVE>CVE-2016-8620</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8620.html</URL>
        <Description>CVE-2016-8620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005640</URL>
        <Description>SUSE Bug 1005640</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.</Note>
    </Notes>
    <CVE>CVE-2016-8621</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8621.html</URL>
        <Description>CVE-2016-8621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005642</URL>
        <Description>SUSE Bug 1005642</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.</Note>
    </Notes>
    <CVE>CVE-2016-8622</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8622.html</URL>
        <Description>CVE-2016-8622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005643</URL>
        <Description>SUSE Bug 1005643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.</Note>
    </Notes>
    <CVE>CVE-2016-8623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8623.html</URL>
        <Description>CVE-2016-8623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005645</URL>
        <Description>SUSE Bug 1005645</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.</Note>
    </Notes>
    <CVE>CVE-2016-8624</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:curl-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl-devel-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-32bit-7.37.0-16.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libcurl4-7.37.0-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8624.html</URL>
        <Description>CVE-2016-8624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005646</URL>
        <Description>SUSE Bug 1005646</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
