<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">curl-7.84.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12214</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">curl-7.84.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the curl-7.84.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12214</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:12214</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-32205/</URL>
      <Description>SUSE CVE CVE-2022-32205 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-32206/</URL>
      <Description>SUSE CVE CVE-2022-32206 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-32207/</URL>
      <Description>SUSE CVE CVE-2022-32207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-32208/</URL>
      <Description>SUSE CVE CVE-2022-32208 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="curl-7.84.0-1.1">
      <FullProductName ProductID="curl-7.84.0-1.1">curl-7.84.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-7.84.0-1.1">
      <FullProductName ProductID="libcurl-devel-7.84.0-1.1">libcurl-devel-7.84.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-32bit-7.84.0-1.1">
      <FullProductName ProductID="libcurl-devel-32bit-7.84.0-1.1">libcurl-devel-32bit-7.84.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-7.84.0-1.1">
      <FullProductName ProductID="libcurl4-7.84.0-1.1">libcurl4-7.84.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-7.84.0-1.1">
      <FullProductName ProductID="libcurl4-32bit-7.84.0-1.1">libcurl4-32bit-7.84.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="curl-7.84.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:curl-7.84.0-1.1">curl-7.84.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-7.84.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl-devel-7.84.0-1.1">libcurl-devel-7.84.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-32bit-7.84.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl-devel-32bit-7.84.0-1.1">libcurl-devel-32bit-7.84.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-7.84.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl4-7.84.0-1.1">libcurl4-7.84.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-7.84.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl4-32bit-7.84.0-1.1">libcurl4-32bit-7.84.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl &lt; 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven't expired. Due to cookie matching rules, a server on `foo.example.com` can set cookies that also would match for `bar.example.com`, making it it possible for a "sister server" to effectively cause a denial of service for a sibling site on the same second level domain using this method.</Note>
    </Notes>
    <CVE>CVE-2022-32205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.84.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-32205.html</URL>
        <Description>CVE-2022-32205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200734</URL>
        <Description>SUSE Bug 1200734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl &lt; 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.</Note>
    </Notes>
    <CVE>CVE-2022-32206</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.84.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-32206.html</URL>
        <Description>CVE-2022-32206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200735</URL>
        <Description>SUSE Bug 1200735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207992</URL>
        <Description>SUSE Bug 1207992</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When curl &lt; 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.</Note>
    </Notes>
    <CVE>CVE-2022-32207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.84.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-32207.html</URL>
        <Description>CVE-2022-32207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200736</URL>
        <Description>SUSE Bug 1200736</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When curl &lt; 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.</Note>
    </Notes>
    <CVE>CVE-2022-32208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.84.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.84.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-32208.html</URL>
        <Description>CVE-2022-32208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200737</URL>
        <Description>SUSE Bug 1200737</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
