{"affected":[{"ecosystem_specific":{"binaries":[{"libcurl-devel":"7.19.7-1.20.52.2"}]},"package":{"ecosystem":"SUSE:Studio Onsite 1.3","name":"curl","purl":"pkg:rpm/suse/curl&distro=SUSE%20Studio%20Onsite%201.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"7.19.7-1.20.52.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for curl fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)\n- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).\n","id":"SUSE-SU-2017:1117-1","modified":"2017-04-26T15:31:56Z","published":"2017-04-26T15:31:56Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20171117-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1015332"},{"type":"REPORT","url":"https://bugzilla.suse.com/1032309"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-9586"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7407"}],"related":["CVE-2016-9586","CVE-2017-7407"],"summary":"Security update for curl","upstream":["CVE-2016-9586","CVE-2017-7407"]}