File _patchinfo of Package patchinfo.4408
<patchinfo incident="4408">
<issue id="1015332" tracker="bnc">VUL-1: CVE-2016-9586: curl: libcurl printf floating point buffer overflow</issue>
<issue id="1027712" tracker="bnc">VUL-0: curl: switch to new client side cipher suite default</issue>
<issue id="1032309" tracker="bnc">VUL-0: CVE-2017-7407: curl: ourWriteOut function might allow physically proximate attacker to obtain sensitive information</issue>
<issue id="2017-7407" tracker="cve" />
<issue id="2016-9586" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>pmonrealgonzalez</packager>
<name>curl</name>
<description>
This update for curl fixes the following issues:
Security issue fixed:
- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).
With this release new default ciphers are active (SUSE_DEFAULT, bsc#1027712).
</description>
<summary>Security update for curl</summary>
</patchinfo>