<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for curl</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:1624-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-06-09T07:40:09Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-06-09T07:40:09Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-06-09T07:40:09Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for curl</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for curl to version 7.60.0 fixes the following issues:

These security issues were fixed:

- CVE-2018-1000300: Prevent heap-based buffer overflow when closing down an FTP
  connection with very long server command replies (bsc#1092094).
- CVE-2018-1000301: Prevent buffer over-read that could have cause reading data
  beyond the end of a heap based buffer used to store downloaded RTSP content
  (bsc#1092098).

These non-security issues were fixed:

- Add CURLOPT_HAPROXYPROTOCOL, support for the HAProxy PROXY protocol
- Add --haproxy-protocol for the command line tool
- Add CURLOPT_DNS_SHUFFLE_ADDRESSES, shuffle returned IP addresses 
- FTP: fix typo in recursive callback detection for seeking
- test1208: marked flaky
- HTTP: make header-less responses still count correct body size
- user-agent.d:: mention --proxy-header as well
- http2: fixes typo
- cleanup: misc typos in strings and comments
- rate-limit: use three second window to better handle high speeds
- examples/hiperfifo.c: improved
- pause: when changing pause state, update socket state
- curl_version_info.3: fix ssl_version description
- add_handle/easy_perform: clear errorbuffer on start if set
- cmake: add support for brotli
- parsedate: support UT timezone
- vauth/ntlm.h: fix the #ifdef header guard
- lib/curl_path.h: added #ifdef header guard
- vauth/cleartext: fix integer overflow check
- CURLINFO_COOKIELIST.3: made the example not leak memory
- cookie.d: mention that &amp;quot;-&amp;quot; as filename means stdin
- CURLINFO_SSL_VERIFYRESULT.3: fixed the example
- http2: read pending frames (including GOAWAY) in connection-check
- timeval: remove compilation warning by casting
- cmake: avoid warn-as-error during config checks
- travis-ci: enable -Werror for CMake builds
- openldap: fix for NULL return from ldap_get_attribute_ber()
- threaded resolver: track resolver time and set suitable timeout values
- cmake: Add advapi32 as explicit link library for win32
- docs: fix CURLINFO_*_T examples use of CURL_FORMAT_CURL_OFF_T
- test1148: set a fixed locale for the test
- cookies: when reading from a file, only remove_expired once
- cookie: store cookies per top-level-domain-specific hash table
- openssl: RESTORED verify locations when verifypeer==0
- file: restore old behavior for file:////foo/bar URLs
- FTP: allow PASV on IPv6 connections when a proxy is being used
- build-openssl.bat: allow custom paths for VS and perl
- winbuild: make the clean target work without build-type
- build-openssl.bat: Refer to VS2017 as VC14.1 instead of VC15
- curl: retry on FTP 4xx, ignore other protocols
- configure: detect (and use) sa_family_t
- examples/sftpuploadresume: Fix Windows large file seek
- build: cleanup to fix clang warnings/errors
- winbuild: updated the documentation
- lib: silence null-dereference warnings
- travis: bump to clang 6 and gcc 7
- travis: build libpsl and make builds use it
- proxy: show getenv proxy use in verbose output
- duphandle: make sure CURLOPT_RESOLVE is duplicated
- all: Refactor malloc+memset to use calloc
- checksrc: Fix typo
- system.h: Add sparcv8plus to oracle/sunpro 32-bit detection
- vauth: Fix typo
- ssh: show libSSH2 error code when closing fails
- test1148: tolerate progress updates better
- urldata: make service names unconditional
- configure: keep LD_LIBRARY_PATH changes local
- ntlm_sspi: fix authentication using Credential Manager
- schannel: add client certificate authentication
- winbuild: Support custom devel paths for each dependency
- schannel: add support for CURLOPT_CAINFO
- http2: handle on_begin_headers() called more than once
- openssl: support OpenSSL 1.1.1 verbose-mode trace messages
- openssl: fix subjectAltName check on non-ASCII platforms
- http2: avoid strstr() on data not zero terminated
- http2: clear the &amp;quot;drain counter&amp;quot; when a stream is closed
- http2: handle GOAWAY properly
- tool_help: clarify --max-time unit of time is seconds
- curl.1: clarify that options and URLs can be mixed
- http2: convert an assert to run-time check
- curl_global_sslset: always provide available backends
- ftplistparser: keep state between invokes
- Curl_memchr: zero length input can't match
- examples/sftpuploadresume: typecast fseek argument to long
- examples/http2-upload: expand buffer to avoid silly warning
- ctype: restore character classification for non-ASCII platforms
- mime: avoid NULL pointer dereference risk
- cookies: ensure that we have cookies before writing jar
- os400.c: fix checksrc warnings
- configure: provide --with-wolfssl as an alias for --with-cyassl
- cyassl: adapt to libraries without TLS 1.0 support built-in
- http2: get rid of another strstr
- checksrc: force indentation of lines after an else
- cookies: remove unused macro
- CURLINFO_PROTOCOL.3: mention the existing defined names
- tests: provide 'manual' as a feature to optionally require
- travis: enable libssh2 on both macos and Linux
- CURLOPT_URL.3: added ENCODING section
- wolfssl: Fix non-blocking connect
- vtls: don't define MD5_DIGEST_LENGTH for wolfssl
- docs: remove extraneous commas in man pages
- URL: fix ASCII dependency in strcpy_url and strlen_url
- ssh-libssh.c: fix left shift compiler warning
- configure: only check for CA bundle for file-using SSL backends
- travis: add an mbedtls build
- http: don't set the &amp;quot;rewind&amp;quot; flag when not uploading anything
- configure: put CURLDEBUG and DEBUGBUILD in lib/curl_config.h
- transfer: don't unset writesockfd on setup of multiplexed conns
- vtls: use unified &amp;quot;supports&amp;quot; bitfield member in backends
- URLs: fix one more http url
- travis: add a build using WolfSSL
- openssl: change FILE ops to BIO ops
- travis: add build using NSS
- smb: reject negative file sizes
- cookies: accept parameter names as cookie name
- http2: getsock fix for uploads
- all over: fixed format specifiers
- http2: use the correct function pointer typedef 
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-06/msg00015.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:1624-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="curl-7.60.0-lp150.2.3.1">
      <FullProductName ProductID="curl-7.60.0-lp150.2.3.1">curl-7.60.0-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="curl-mini-7.60.0-lp150.2.3.1">
      <FullProductName ProductID="curl-mini-7.60.0-lp150.2.3.1">curl-mini-7.60.0-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-7.60.0-lp150.2.3.1">
      <FullProductName ProductID="libcurl-devel-7.60.0-lp150.2.3.1">libcurl-devel-7.60.0-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-32bit-7.60.0-lp150.2.3.1">
      <FullProductName ProductID="libcurl-devel-32bit-7.60.0-lp150.2.3.1">libcurl-devel-32bit-7.60.0-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-mini-devel-7.60.0-lp150.2.3.1">
      <FullProductName ProductID="libcurl-mini-devel-7.60.0-lp150.2.3.1">libcurl-mini-devel-7.60.0-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-7.60.0-lp150.2.3.1">
      <FullProductName ProductID="libcurl4-7.60.0-lp150.2.3.1">libcurl4-7.60.0-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-7.60.0-lp150.2.3.1">
      <FullProductName ProductID="libcurl4-32bit-7.60.0-lp150.2.3.1">libcurl4-32bit-7.60.0-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-mini-7.60.0-lp150.2.3.1">
      <FullProductName ProductID="libcurl4-mini-7.60.0-lp150.2.3.1">libcurl4-mini-7.60.0-lp150.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="curl-7.60.0-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:curl-7.60.0-lp150.2.3.1">curl-7.60.0-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-mini-7.60.0-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:curl-mini-7.60.0-lp150.2.3.1">curl-mini-7.60.0-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-7.60.0-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libcurl-devel-7.60.0-lp150.2.3.1">libcurl-devel-7.60.0-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-32bit-7.60.0-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libcurl-devel-32bit-7.60.0-lp150.2.3.1">libcurl-devel-32bit-7.60.0-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-mini-devel-7.60.0-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libcurl-mini-devel-7.60.0-lp150.2.3.1">libcurl-mini-devel-7.60.0-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-7.60.0-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libcurl4-7.60.0-lp150.2.3.1">libcurl4-7.60.0-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-7.60.0-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libcurl4-32bit-7.60.0-lp150.2.3.1">libcurl4-32bit-7.60.0-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-mini-7.60.0-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libcurl4-mini-7.60.0-lp150.2.3.1">libcurl4-mini-7.60.0-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl version curl 7.54.1 to and including curl 7.59.0 contains a CWE-122: Heap-based Buffer Overflow vulnerability in denial of service and more that can result in curl might overflow a heap based memory buffer when closing down an FTP connection with very long server command replies.. This vulnerability appears to have been fixed in curl &lt; 7.54.1 and curl &gt;= 7.60.0.</Note>
    </Notes>
    <CVE>CVE-2018-1000300</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:curl-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:curl-mini-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl-devel-32bit-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl-devel-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl-mini-devel-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl4-32bit-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl4-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl4-mini-7.60.0-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-06/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000300.html</URL>
        <Description>CVE-2018-1000300</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092094</URL>
        <Description>SUSE Bug 1092094</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101651</URL>
        <Description>SUSE Bug 1101651</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101653</URL>
        <Description>SUSE Bug 1101653</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112147</URL>
        <Description>SUSE Bug 1112147</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112151</URL>
        <Description>SUSE Bug 1112151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122292</URL>
        <Description>SUSE Bug 1122292</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl &lt; 7.20.0 and curl &gt;= 7.60.0.</Note>
    </Notes>
    <CVE>CVE-2018-1000301</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:curl-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:curl-mini-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl-devel-32bit-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl-devel-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl-mini-devel-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl4-32bit-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl4-7.60.0-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl4-mini-7.60.0-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-06/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000301.html</URL>
        <Description>CVE-2018-1000301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092098</URL>
        <Description>SUSE Bug 1092098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101651</URL>
        <Description>SUSE Bug 1101651</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101653</URL>
        <Description>SUSE Bug 1101653</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112147</URL>
        <Description>SUSE Bug 1112147</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112151</URL>
        <Description>SUSE Bug 1112151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122292</URL>
        <Description>SUSE Bug 1122292</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
