SUSE-SU-2016:2700-1

Source
https://www.suse.com/support/update/announcement/2016/suse-su-20162700-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2016:2700-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2016:2700-1
Related
Published
2016-11-02T11:07:24Z
Modified
2016-11-02T11:07:24Z
Summary
Security update for curl
Details

This update for curl fixes the following issues:

  • CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
  • CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
  • CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
  • CVE-2016-8619: double-free in krb5 code (bsc#1005638)
  • CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
  • CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
  • CVE-2016-8616: case insensitive password comparison (bsc#1005634)
  • CVE-2016-8615: cookie injection for other servers (bsc#1005633)
  • CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
  • CVE-2016-7141: Fixed incorrect reuse of client certificates with NSS not fixed in CVE-2016-5420 (bsc#997420)
References

Affected packages

SUSE:Studio Onsite 1.3 / curl

Package

Name
curl
Purl
purl:rpm/suse/curl&distro=SUSE%20Studio%20Onsite%201.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.19.7-1.20.47.2

Ecosystem specific

{
    "binaries": [
        {
            "libcurl-devel": "7.19.7-1.20.47.2"
        }
    ]
}