<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for curl</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2227-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-09-02T13:01:53Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-09-02T13:01:53Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-09-02T13:01:53Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for curl</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for curl fixes the following issues:

- fixing a performance regression with FTP (boo#991746)
- TLS session resumption client cert bypass (boo#991389, CVE-2016-5419)
- Re-using connections with wrong client cert (boo#991390, CVE-2016-5420)
- use of connection struct after free (boo#991391, CVE-2016-5421)

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2227-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE 13.2">
      <Branch Type="Product Name" Name="openSUSE 13.2">
        <FullProductName ProductID="openSUSE 13.2">openSUSE 13.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="curl-7.42.1-25.1">
      <FullProductName ProductID="curl-7.42.1-25.1">curl-7.42.1-25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="curl-debuginfo-7.42.1-25.1">
      <FullProductName ProductID="curl-debuginfo-7.42.1-25.1">curl-debuginfo-7.42.1-25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="curl-debugsource-7.42.1-25.1">
      <FullProductName ProductID="curl-debugsource-7.42.1-25.1">curl-debugsource-7.42.1-25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-7.42.1-25.1">
      <FullProductName ProductID="libcurl-devel-7.42.1-25.1">libcurl-devel-7.42.1-25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-32bit-7.42.1-25.1">
      <FullProductName ProductID="libcurl-devel-32bit-7.42.1-25.1">libcurl-devel-32bit-7.42.1-25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-7.42.1-25.1">
      <FullProductName ProductID="libcurl4-7.42.1-25.1">libcurl4-7.42.1-25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-7.42.1-25.1">
      <FullProductName ProductID="libcurl4-32bit-7.42.1-25.1">libcurl4-32bit-7.42.1-25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-debuginfo-7.42.1-25.1">
      <FullProductName ProductID="libcurl4-debuginfo-7.42.1-25.1">libcurl4-debuginfo-7.42.1-25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-debuginfo-32bit-7.42.1-25.1">
      <FullProductName ProductID="libcurl4-debuginfo-32bit-7.42.1-25.1">libcurl4-debuginfo-32bit-7.42.1-25.1</FullProductName>
    </Branch>
    <Relationship ProductReference="curl-7.42.1-25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:curl-7.42.1-25.1">curl-7.42.1-25.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-debuginfo-7.42.1-25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:curl-debuginfo-7.42.1-25.1">curl-debuginfo-7.42.1-25.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-debugsource-7.42.1-25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:curl-debugsource-7.42.1-25.1">curl-debugsource-7.42.1-25.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-7.42.1-25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libcurl-devel-7.42.1-25.1">libcurl-devel-7.42.1-25.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-32bit-7.42.1-25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libcurl-devel-32bit-7.42.1-25.1">libcurl-devel-32bit-7.42.1-25.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-7.42.1-25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libcurl4-7.42.1-25.1">libcurl4-7.42.1-25.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-7.42.1-25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libcurl4-32bit-7.42.1-25.1">libcurl4-32bit-7.42.1-25.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-debuginfo-7.42.1-25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libcurl4-debuginfo-7.42.1-25.1">libcurl4-debuginfo-7.42.1-25.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-debuginfo-32bit-7.42.1-25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libcurl4-debuginfo-32bit-7.42.1-25.1">libcurl4-debuginfo-32bit-7.42.1-25.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.</Note>
    </Notes>
    <CVE>CVE-2016-5419</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:curl-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:curl-debuginfo-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:curl-debugsource-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl-devel-32bit-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl-devel-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl4-32bit-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl4-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl4-debuginfo-32bit-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl4-debuginfo-7.42.1-25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.7</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5419.html</URL>
        <Description>CVE-2016-5419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033413</URL>
        <Description>SUSE Bug 1033413</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033442</URL>
        <Description>SUSE Bug 1033442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991389</URL>
        <Description>SUSE Bug 991389</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.</Note>
    </Notes>
    <CVE>CVE-2016-5420</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:curl-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:curl-debuginfo-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:curl-debugsource-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl-devel-32bit-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl-devel-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl4-32bit-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl4-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl4-debuginfo-32bit-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl4-debuginfo-7.42.1-25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5420.html</URL>
        <Description>CVE-2016-5420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991390</URL>
        <Description>SUSE Bug 991390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/997420</URL>
        <Description>SUSE Bug 997420</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-5421</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:curl-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:curl-debuginfo-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:curl-debugsource-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl-devel-32bit-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl-devel-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl4-32bit-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl4-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl4-debuginfo-32bit-7.42.1-25.1</ProductID>
        <ProductID>openSUSE 13.2:libcurl4-debuginfo-7.42.1-25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5421.html</URL>
        <Description>CVE-2016-5421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017590</URL>
        <Description>SUSE Bug 1017590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991391</URL>
        <Description>SUSE Bug 991391</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
