openSUSE Security Update: Security update for curl ______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0794-1 Rating: moderate References: #1084521 #1084524 #1084532 Cross-References: CVE-2018-1000120 CVE-2018-1000121 CVE-2018-1000122
Affected Products: openSUSE Leap 42.3 ______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for curl fixes the following issues:
Following security issues were fixed:
- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521). - CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524). - CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-299=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
curl-7.37.0-33.1 curl-debuginfo-7.37.0-33.1 curl-debugsource-7.37.0-33.1 libcurl-devel-7.37.0-33.1 libcurl4-7.37.0-33.1 libcurl4-debuginfo-7.37.0-33.1
- openSUSE Leap 42.3 (x86_64):
libcurl-devel-32bit-7.37.0-33.1 libcurl4-32bit-7.37.0-33.1 libcurl4-debuginfo-32bit-7.37.0-33.1
References:
https://www.suse.com/security/cve/CVE-2018-1000120.html https://www.suse.com/security/cve/CVE-2018-1000121.html https://www.suse.com/security/cve/CVE-2018-1000122.html https://bugzilla.suse.com/1084521 https://bugzilla.suse.com/1084524 https://bugzilla.suse.com/1084532