<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for curl</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:2230-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-05-17T08:00:26Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-05-17T08:00:26Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-05-17T08:00:26Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for curl</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for curl fixes the following issues:

- CVE-2023-28320: Fixed siglongjmp race condition (bsc#1211231).
- CVE-2023-28321: Fixed IDN wildcard matching (bsc#1211232).
- CVE-2023-28322: Fixed POST-after-PUT confusion (bsc#1211233).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-2230,SUSE-SLE-SERVER-12-SP2-BCL-2023-2230</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232230-1/</URL>
      <Description>Link for SUSE-SU-2023:2230-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2023-May/029436.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:2230-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1211231</URL>
      <Description>SUSE Bug 1211231</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1211232</URL>
      <Description>SUSE Bug 1211232</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1211233</URL>
      <Description>SUSE Bug 1211233</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1211339</URL>
      <Description>SUSE Bug 1211339</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-28320/</URL>
      <Description>SUSE CVE CVE-2023-28320 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-28321/</URL>
      <Description>SUSE CVE CVE-2023-28321 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-28322/</URL>
      <Description>SUSE CVE CVE-2023-28322 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP2-BCL">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP2-BCL">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL" CPE="cpe:/o:suse:sles-bcl:12:sp2">SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="curl-7.37.0-37.98.1">
      <FullProductName ProductID="curl-7.37.0-37.98.1">curl-7.37.0-37.98.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-7.37.0-37.98.1">
      <FullProductName ProductID="libcurl-devel-7.37.0-37.98.1">libcurl-devel-7.37.0-37.98.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-32bit-7.37.0-37.98.1">
      <FullProductName ProductID="libcurl-devel-32bit-7.37.0-37.98.1">libcurl-devel-32bit-7.37.0-37.98.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-64bit-7.37.0-37.98.1">
      <FullProductName ProductID="libcurl-devel-64bit-7.37.0-37.98.1">libcurl-devel-64bit-7.37.0-37.98.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-7.37.0-37.98.1">
      <FullProductName ProductID="libcurl4-7.37.0-37.98.1">libcurl4-7.37.0-37.98.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-7.37.0-37.98.1">
      <FullProductName ProductID="libcurl4-32bit-7.37.0-37.98.1">libcurl4-32bit-7.37.0-37.98.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-64bit-7.37.0-37.98.1">
      <FullProductName ProductID="libcurl4-64bit-7.37.0-37.98.1">libcurl4-64bit-7.37.0-37.98.1</FullProductName>
    </Branch>
    <Relationship ProductReference="curl-7.37.0-37.98.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:curl-7.37.0-37.98.1">curl-7.37.0-37.98.1 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-7.37.0-37.98.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-7.37.0-37.98.1">libcurl4-7.37.0-37.98.1 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-7.37.0-37.98.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-32bit-7.37.0-37.98.1">libcurl4-32bit-7.37.0-37.98.1 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A denial of service vulnerability exists in curl &lt;v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.</Note>
    </Notes>
    <CVE>CVE-2023-28320</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:curl-7.37.0-37.98.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-32bit-7.37.0-37.98.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-7.37.0-37.98.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232230-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-28320.html</URL>
        <Description>CVE-2023-28320</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211231</URL>
        <Description>SUSE Bug 1211231</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218210</URL>
        <Description>SUSE Bug 1218210</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.</Note>
    </Notes>
    <CVE>CVE-2023-28321</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:curl-7.37.0-37.98.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-32bit-7.37.0-37.98.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-7.37.0-37.98.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232230-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-28321.html</URL>
        <Description>CVE-2023-28321</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211232</URL>
        <Description>SUSE Bug 1211232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218210</URL>
        <Description>SUSE Bug 1218210</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.</Note>
    </Notes>
    <CVE>CVE-2023-28322</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:curl-7.37.0-37.98.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-32bit-7.37.0-37.98.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-7.37.0-37.98.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232230-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-28322.html</URL>
        <Description>CVE-2023-28322</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211233</URL>
        <Description>SUSE Bug 1211233</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
