<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">curl-7.51.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10303</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">curl-7.51.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the curl-7.51.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10303</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10303</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-0037/</URL>
      <Description>SUSE CVE CVE-2009-0037 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-2417/</URL>
      <Description>SUSE CVE CVE-2009-2417 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0249/</URL>
      <Description>SUSE CVE CVE-2013-0249 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1944/</URL>
      <Description>SUSE CVE CVE-2013-1944 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2174/</URL>
      <Description>SUSE CVE CVE-2013-2174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4545/</URL>
      <Description>SUSE CVE CVE-2013-4545 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0015/</URL>
      <Description>SUSE CVE CVE-2014-0015 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0138/</URL>
      <Description>SUSE CVE CVE-2014-0138 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0139/</URL>
      <Description>SUSE CVE CVE-2014-0139 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3613/</URL>
      <Description>SUSE CVE CVE-2014-3613 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3620/</URL>
      <Description>SUSE CVE CVE-2014-3620 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8150/</URL>
      <Description>SUSE CVE CVE-2014-8150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3143/</URL>
      <Description>SUSE CVE CVE-2015-3143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3144/</URL>
      <Description>SUSE CVE CVE-2015-3144 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3145/</URL>
      <Description>SUSE CVE CVE-2015-3145 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3148/</URL>
      <Description>SUSE CVE CVE-2015-3148 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3153/</URL>
      <Description>SUSE CVE CVE-2015-3153 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3236/</URL>
      <Description>SUSE CVE CVE-2015-3236 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3237/</URL>
      <Description>SUSE CVE CVE-2015-3237 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0755/</URL>
      <Description>SUSE CVE CVE-2016-0755 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7167/</URL>
      <Description>SUSE CVE CVE-2016-7167 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8615/</URL>
      <Description>SUSE CVE CVE-2016-8615 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8616/</URL>
      <Description>SUSE CVE CVE-2016-8616 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8617/</URL>
      <Description>SUSE CVE CVE-2016-8617 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8618/</URL>
      <Description>SUSE CVE CVE-2016-8618 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8619/</URL>
      <Description>SUSE CVE CVE-2016-8619 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8620/</URL>
      <Description>SUSE CVE CVE-2016-8620 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8621/</URL>
      <Description>SUSE CVE CVE-2016-8621 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8622/</URL>
      <Description>SUSE CVE CVE-2016-8622 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8623/</URL>
      <Description>SUSE CVE CVE-2016-8623 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8624/</URL>
      <Description>SUSE CVE CVE-2016-8624 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8625/</URL>
      <Description>SUSE CVE CVE-2016-8625 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="curl-7.51.0-1.1">
      <FullProductName ProductID="curl-7.51.0-1.1">curl-7.51.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-7.51.0-1.1">
      <FullProductName ProductID="libcurl-devel-7.51.0-1.1">libcurl-devel-7.51.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-32bit-7.51.0-1.1">
      <FullProductName ProductID="libcurl-devel-32bit-7.51.0-1.1">libcurl-devel-32bit-7.51.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-7.51.0-1.1">
      <FullProductName ProductID="libcurl4-7.51.0-1.1">libcurl4-7.51.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-7.51.0-1.1">
      <FullProductName ProductID="libcurl4-32bit-7.51.0-1.1">libcurl4-32bit-7.51.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="curl-7.51.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:curl-7.51.0-1.1">curl-7.51.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-7.51.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1">libcurl-devel-7.51.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-32bit-7.51.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1">libcurl-devel-32bit-7.51.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-7.51.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl4-7.51.0-1.1">libcurl4-7.51.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-7.51.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1">libcurl4-32bit-7.51.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.</Note>
    </Notes>
    <CVE>CVE-2009-0037</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-0037.html</URL>
        <Description>CVE-2009-0037</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/475103</URL>
        <Description>SUSE Bug 475103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/527990</URL>
        <Description>SUSE Bug 527990</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.</Note>
    </Notes>
    <CVE>CVE-2009-2417</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-2417.html</URL>
        <Description>CVE-2009-2417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/527990</URL>
        <Description>SUSE Bug 527990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/528372</URL>
        <Description>SUSE Bug 528372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.</Note>
    </Notes>
    <CVE>CVE-2013-0249</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0249.html</URL>
        <Description>CVE-2013-0249</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/802411</URL>
        <Description>SUSE Bug 802411</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.</Note>
    </Notes>
    <CVE>CVE-2013-1944</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1944.html</URL>
        <Description>CVE-2013-1944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/814655</URL>
        <Description>SUSE Bug 814655</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.</Note>
    </Notes>
    <CVE>CVE-2013-2174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2174.html</URL>
        <Description>CVE-2013-2174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/824517</URL>
        <Description>SUSE Bug 824517</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917692</URL>
        <Description>SUSE Bug 917692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.</Note>
    </Notes>
    <CVE>CVE-2013-4545</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4545.html</URL>
        <Description>CVE-2013-4545</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/849596</URL>
        <Description>SUSE Bug 849596</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870444</URL>
        <Description>SUSE Bug 870444</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880252</URL>
        <Description>SUSE Bug 880252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882520</URL>
        <Description>SUSE Bug 882520</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924250</URL>
        <Description>SUSE Bug 924250</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.</Note>
    </Notes>
    <CVE>CVE-2014-0015</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0015.html</URL>
        <Description>CVE-2014-0015</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/858673</URL>
        <Description>SUSE Bug 858673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/868627</URL>
        <Description>SUSE Bug 868627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880252</URL>
        <Description>SUSE Bug 880252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882520</URL>
        <Description>SUSE Bug 882520</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927556</URL>
        <Description>SUSE Bug 927556</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962983</URL>
        <Description>SUSE Bug 962983</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.</Note>
    </Notes>
    <CVE>CVE-2014-0138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0138.html</URL>
        <Description>CVE-2014-0138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/868627</URL>
        <Description>SUSE Bug 868627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880252</URL>
        <Description>SUSE Bug 880252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882520</URL>
        <Description>SUSE Bug 882520</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.</Note>
    </Notes>
    <CVE>CVE-2014-0139</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0139.html</URL>
        <Description>CVE-2014-0139</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/868629</URL>
        <Description>SUSE Bug 868629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880252</URL>
        <Description>SUSE Bug 880252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882520</URL>
        <Description>SUSE Bug 882520</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.</Note>
    </Notes>
    <CVE>CVE-2014-3613</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3613.html</URL>
        <Description>CVE-2014-3613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/894575</URL>
        <Description>SUSE Bug 894575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.</Note>
    </Notes>
    <CVE>CVE-2014-3620</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3620.html</URL>
        <Description>CVE-2014-3620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199221</URL>
        <Description>SUSE Bug 1199221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/894575</URL>
        <Description>SUSE Bug 894575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/895991</URL>
        <Description>SUSE Bug 895991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.</Note>
    </Notes>
    <CVE>CVE-2014-8150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8150.html</URL>
        <Description>CVE-2014-8150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/911363</URL>
        <Description>SUSE Bug 911363</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.</Note>
    </Notes>
    <CVE>CVE-2015-3143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3143.html</URL>
        <Description>CVE-2015-3143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927556</URL>
        <Description>SUSE Bug 927556</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."</Note>
    </Notes>
    <CVE>CVE-2015-3144</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3144.html</URL>
        <Description>CVE-2015-3144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927608</URL>
        <Description>SUSE Bug 927608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.</Note>
    </Notes>
    <CVE>CVE-2015-3145</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3145.html</URL>
        <Description>CVE-2015-3145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927607</URL>
        <Description>SUSE Bug 927607</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.</Note>
    </Notes>
    <CVE>CVE-2015-3148</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3148.html</URL>
        <Description>CVE-2015-3148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092962</URL>
        <Description>SUSE Bug 1092962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927746</URL>
        <Description>SUSE Bug 927746</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.</Note>
    </Notes>
    <CVE>CVE-2015-3153</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3153.html</URL>
        <Description>CVE-2015-3153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928533</URL>
        <Description>SUSE Bug 928533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-3236</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3236.html</URL>
        <Description>CVE-2015-3236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934501</URL>
        <Description>SUSE Bug 934501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values.</Note>
    </Notes>
    <CVE>CVE-2015-3237</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3237.html</URL>
        <Description>CVE-2015-3237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934502</URL>
        <Description>SUSE Bug 934502</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ConnectionExists function in lib/url.c in libcurl before 7.47.0 does not properly re-use NTLM-authenticated proxy connections, which might allow remote attackers to authenticate as other users via a request, a similar issue to CVE-2014-0015.</Note>
    </Notes>
    <CVE>CVE-2016-0755</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0755.html</URL>
        <Description>CVE-2016-0755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962983</URL>
        <Description>SUSE Bug 962983</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2016-7167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7167.html</URL>
        <Description>CVE-2016-7167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998760</URL>
        <Description>SUSE Bug 998760</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.</Note>
    </Notes>
    <CVE>CVE-2016-8615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8615.html</URL>
        <Description>CVE-2016-8615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005633</URL>
        <Description>SUSE Bug 1005633</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.</Note>
    </Notes>
    <CVE>CVE-2016-8616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8616.html</URL>
        <Description>CVE-2016-8616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005634</URL>
        <Description>SUSE Bug 1005634</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.</Note>
    </Notes>
    <CVE>CVE-2016-8617</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.7</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8617.html</URL>
        <Description>CVE-2016-8617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005635</URL>
        <Description>SUSE Bug 1005635</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.</Note>
    </Notes>
    <CVE>CVE-2016-8618</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8618.html</URL>
        <Description>CVE-2016-8618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005637</URL>
        <Description>SUSE Bug 1005637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.</Note>
    </Notes>
    <CVE>CVE-2016-8619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8619.html</URL>
        <Description>CVE-2016-8619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005638</URL>
        <Description>SUSE Bug 1005638</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.</Note>
    </Notes>
    <CVE>CVE-2016-8620</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8620.html</URL>
        <Description>CVE-2016-8620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005640</URL>
        <Description>SUSE Bug 1005640</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.</Note>
    </Notes>
    <CVE>CVE-2016-8621</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8621.html</URL>
        <Description>CVE-2016-8621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005642</URL>
        <Description>SUSE Bug 1005642</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.</Note>
    </Notes>
    <CVE>CVE-2016-8622</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8622.html</URL>
        <Description>CVE-2016-8622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005643</URL>
        <Description>SUSE Bug 1005643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.</Note>
    </Notes>
    <CVE>CVE-2016-8623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8623.html</URL>
        <Description>CVE-2016-8623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005645</URL>
        <Description>SUSE Bug 1005645</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.</Note>
    </Notes>
    <CVE>CVE-2016-8624</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8624.html</URL>
        <Description>CVE-2016-8624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005646</URL>
        <Description>SUSE Bug 1005646</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl before version 7.51.0 uses outdated IDNA 2003 standard to handle International Domain Names and this may lead users to potentially and unknowingly issue network transfer requests to the wrong host.</Note>
    </Notes>
    <CVE>CVE-2016-8625</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.51.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.51.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8625.html</URL>
        <Description>CVE-2016-8625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005649</URL>
        <Description>SUSE Bug 1005649</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
