<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libssh2_org</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:2129-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-12-01T05:25:38Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-12-01T05:25:38Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-12-01T05:25:38Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libssh2_org</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libssh2_org fixes the following issues:

- Version update to 1.9.0: [bsc#1178083, jsc#SLE-16922]
   Enhancements and bugfixes:
    * adds ECDSA keys and host key support when using OpenSSL
    * adds ED25519 key and host key support when using OpenSSL 1.1.1
    * adds OpenSSH style key file reading
    * adds AES CTR mode support when using WinCNG
    * adds PEM passphrase protected file support for Libgcrypt and WinCNG
    * adds SHA256 hostkey fingerprint
    * adds libssh2_agent_get_identity_path() and libssh2_agent_set_identity_path()
    * adds explicit zeroing of sensitive data in memory
    * adds additional bounds checks to network buffer reads
    * adds the ability to use the server default permissions when creating sftp directories
    * adds support for building with OpenSSL no engine flag
    * adds support for building with LibreSSL
    * increased sftp packet size to 256k
    * fixed oversized packet handling in sftp
    * fixed building with OpenSSL 1.1
    * fixed a possible crash if sftp stat gets an unexpected response
    * fixed incorrect parsing of the KEX preference string value
    * fixed conditional RSA and AES-CTR support
    * fixed a small memory leak during the key exchange process
    * fixed a possible memory leak of the ssh banner string
    * fixed various small memory leaks in the backends
    * fixed possible out of bounds read when parsing public keys from the server
    * fixed possible out of bounds read when parsing invalid PEM files
    * no longer null terminates the scp remote exec command
    * now handle errors when diffie hellman key pair generation fails
    * improved building instructions
    * improved unit tests

- Version update to 1.8.2: [bsc#1130103]
   Bug fixes:
    * Fixed the misapplied userauth patch that broke 1.8.1
    * moved the MAX size declarations from the public header
This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-2129</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:2129-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1130103</URL>
      <Description>SUSE Bug 1130103</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178083</URL>
      <Description>SUSE Bug 1178083</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17498/</URL>
      <Description>SUSE CVE CVE-2019-17498 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3855/</URL>
      <Description>SUSE CVE CVE-2019-3855 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3856/</URL>
      <Description>SUSE CVE CVE-2019-3856 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3857/</URL>
      <Description>SUSE CVE CVE-2019-3857 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3858/</URL>
      <Description>SUSE CVE CVE-2019-3858 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3859/</URL>
      <Description>SUSE CVE CVE-2019-3859 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3860/</URL>
      <Description>SUSE CVE CVE-2019-3860 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3861/</URL>
      <Description>SUSE CVE CVE-2019-3861 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3862/</URL>
      <Description>SUSE CVE CVE-2019-3862 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3863/</URL>
      <Description>SUSE CVE CVE-2019-3863 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libssh2-1-1.9.0-lp152.8.3.1">
      <FullProductName ProductID="libssh2-1-1.9.0-lp152.8.3.1">libssh2-1-1.9.0-lp152.8.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libssh2-1-32bit-1.9.0-lp152.8.3.1">
      <FullProductName ProductID="libssh2-1-32bit-1.9.0-lp152.8.3.1">libssh2-1-32bit-1.9.0-lp152.8.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libssh2-devel-1.9.0-lp152.8.3.1">
      <FullProductName ProductID="libssh2-devel-1.9.0-lp152.8.3.1">libssh2-devel-1.9.0-lp152.8.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libssh2-1-1.9.0-lp152.8.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libssh2-1-1.9.0-lp152.8.3.1">libssh2-1-1.9.0-lp152.8.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libssh2-1-32bit-1.9.0-lp152.8.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libssh2-1-32bit-1.9.0-lp152.8.3.1">libssh2-1-32bit-1.9.0-lp152.8.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libssh2-devel-1.9.0-lp152.8.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libssh2-devel-1.9.0-lp152.8.3.1">libssh2-devel-1.9.0-lp152.8.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.</Note>
    </Notes>
    <CVE>CVE-2019-17498</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libssh2-1-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-1-32bit-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-devel-1.9.0-lp152.8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17498.html</URL>
        <Description>CVE-2019-17498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154862</URL>
        <Description>SUSE Bug 1154862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171566</URL>
        <Description>SUSE Bug 1171566</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.</Note>
    </Notes>
    <CVE>CVE-2019-3855</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libssh2-1-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-1-32bit-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-devel-1.9.0-lp152.8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3855.html</URL>
        <Description>CVE-2019-3855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128471</URL>
        <Description>SUSE Bug 1128471</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1134329</URL>
        <Description>SUSE Bug 1134329</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141850</URL>
        <Description>SUSE Bug 1141850</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.</Note>
    </Notes>
    <CVE>CVE-2019-3856</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libssh2-1-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-1-32bit-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-devel-1.9.0-lp152.8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3856.html</URL>
        <Description>CVE-2019-3856</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128472</URL>
        <Description>SUSE Bug 1128472</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.</Note>
    </Notes>
    <CVE>CVE-2019-3857</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libssh2-1-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-1-32bit-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-devel-1.9.0-lp152.8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3857.html</URL>
        <Description>CVE-2019-3857</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128474</URL>
        <Description>SUSE Bug 1128474</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.</Note>
    </Notes>
    <CVE>CVE-2019-3858</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libssh2-1-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-1-32bit-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-devel-1.9.0-lp152.8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3858.html</URL>
        <Description>CVE-2019-3858</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128476</URL>
        <Description>SUSE Bug 1128476</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.</Note>
    </Notes>
    <CVE>CVE-2019-3859</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libssh2-1-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-1-32bit-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-devel-1.9.0-lp152.8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3859.html</URL>
        <Description>CVE-2019-3859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128480</URL>
        <Description>SUSE Bug 1128480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130103</URL>
        <Description>SUSE Bug 1130103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.</Note>
    </Notes>
    <CVE>CVE-2019-3860</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libssh2-1-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-1-32bit-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-devel-1.9.0-lp152.8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3860.html</URL>
        <Description>CVE-2019-3860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128481</URL>
        <Description>SUSE Bug 1128481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136570</URL>
        <Description>SUSE Bug 1136570</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.</Note>
    </Notes>
    <CVE>CVE-2019-3861</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libssh2-1-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-1-32bit-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-devel-1.9.0-lp152.8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3861.html</URL>
        <Description>CVE-2019-3861</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128490</URL>
        <Description>SUSE Bug 1128490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.</Note>
    </Notes>
    <CVE>CVE-2019-3862</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libssh2-1-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-1-32bit-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-devel-1.9.0-lp152.8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3862.html</URL>
        <Description>CVE-2019-3862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128492</URL>
        <Description>SUSE Bug 1128492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.</Note>
    </Notes>
    <CVE>CVE-2019-3863</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libssh2-1-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-1-32bit-1.9.0-lp152.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libssh2-devel-1.9.0-lp152.8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3863.html</URL>
        <Description>CVE-2019-3863</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128493</URL>
        <Description>SUSE Bug 1128493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130103</URL>
        <Description>SUSE Bug 1130103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135434</URL>
        <Description>SUSE Bug 1135434</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
