<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">curl-7.88.1-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12735</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">curl-7.88.1-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the curl-7.88.1-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12735</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:12735</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-23914/</URL>
      <Description>SUSE CVE CVE-2023-23914 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-23915/</URL>
      <Description>SUSE CVE CVE-2023-23915 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-23916/</URL>
      <Description>SUSE CVE CVE-2023-23916 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="curl-7.88.1-1.1">
      <FullProductName ProductID="curl-7.88.1-1.1">curl-7.88.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-7.88.1-1.1">
      <FullProductName ProductID="libcurl-devel-7.88.1-1.1">libcurl-devel-7.88.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-32bit-7.88.1-1.1">
      <FullProductName ProductID="libcurl-devel-32bit-7.88.1-1.1">libcurl-devel-32bit-7.88.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-7.88.1-1.1">
      <FullProductName ProductID="libcurl4-7.88.1-1.1">libcurl4-7.88.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-7.88.1-1.1">
      <FullProductName ProductID="libcurl4-32bit-7.88.1-1.1">libcurl4-32bit-7.88.1-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="curl-7.88.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:curl-7.88.1-1.1">curl-7.88.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-7.88.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl-devel-7.88.1-1.1">libcurl-devel-7.88.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-32bit-7.88.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl-devel-32bit-7.88.1-1.1">libcurl-devel-32bit-7.88.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-7.88.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl4-7.88.1-1.1">libcurl4-7.88.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-7.88.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl4-32bit-7.88.1-1.1">libcurl4-32bit-7.88.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A cleartext transmission of sensitive information vulnerability exists in curl &lt;v7.88.0 that could cause HSTS functionality fail when multiple URLs are requested serially. Using its HSTS support, curl can be instructed to use HTTPS instead of usingan insecure clear-text HTTP step even when HTTP is provided in the URL. ThisHSTS mechanism would however surprisingly be ignored by subsequent transferswhen done on the same command line because the state would not be properlycarried on.</Note>
    </Notes>
    <CVE>CVE-2023-23914</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.88.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.88.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.88.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.88.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.88.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-23914.html</URL>
        <Description>CVE-2023-23914</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207990</URL>
        <Description>SUSE Bug 1207990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207991</URL>
        <Description>SUSE Bug 1207991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A cleartext transmission of sensitive information vulnerability exists in curl &lt;v7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS.</Note>
    </Notes>
    <CVE>CVE-2023-23915</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.88.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.88.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.88.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.88.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.88.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-23915.html</URL>
        <Description>CVE-2023-23915</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207991</URL>
        <Description>SUSE Bug 1207991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An allocation of resources without limits or throttling vulnerability exists in curl &lt;v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.</Note>
    </Notes>
    <CVE>CVE-2023-23916</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-7.88.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-7.88.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-7.88.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-7.88.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-7.88.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-23916.html</URL>
        <Description>CVE-2023-23916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207992</URL>
        <Description>SUSE Bug 1207992</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
