SUSE-SU-2018:2715-1: moderate: Security update for curl

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Sep 14 10:10:19 MDT 2018


   SUSE Security Update: Security update for curl
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2715-1
Rating:             moderate
References:         #1089533 #1106019 
Cross-References:   CVE-2018-14618
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP3
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP3
                    SUSE CaaS Platform ALL
                    SUSE CaaS Platform 3.0
                    OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________

   An update that solves one vulnerability and has one errata
   is now available.

Description:

   This update for curl fixes the following issues:

   This security issue was fixed:

   - CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
     (bsc#1106019)

   This non-security issue was fixed:

   - Fixed erroneous debug message when paired with OpenSSL (bsc#1089533)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP3:

      zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-1903=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1903=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-1903=1

   - SUSE CaaS Platform ALL:

      To install this update, use the SUSE CaaS Platform Velum dashboard.
      It will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.

   - SUSE CaaS Platform 3.0:

      To install this update, use the SUSE CaaS Platform Velum dashboard.
      It will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.

   - OpenStack Cloud Magnum Orchestration 7:

      zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1903=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

      curl-debuginfo-7.37.0-37.26.1
      curl-debugsource-7.37.0-37.26.1
      libcurl-devel-7.37.0-37.26.1

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      curl-7.37.0-37.26.1
      curl-debuginfo-7.37.0-37.26.1
      curl-debugsource-7.37.0-37.26.1
      libcurl4-7.37.0-37.26.1
      libcurl4-debuginfo-7.37.0-37.26.1

   - SUSE Linux Enterprise Server 12-SP3 (s390x x86_64):

      libcurl4-32bit-7.37.0-37.26.1
      libcurl4-debuginfo-32bit-7.37.0-37.26.1

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      curl-7.37.0-37.26.1
      curl-debuginfo-7.37.0-37.26.1
      curl-debugsource-7.37.0-37.26.1
      libcurl4-32bit-7.37.0-37.26.1
      libcurl4-7.37.0-37.26.1
      libcurl4-debuginfo-32bit-7.37.0-37.26.1
      libcurl4-debuginfo-7.37.0-37.26.1

   - SUSE CaaS Platform ALL (x86_64):

      curl-7.37.0-37.26.1
      curl-debuginfo-7.37.0-37.26.1
      curl-debugsource-7.37.0-37.26.1
      libcurl4-7.37.0-37.26.1
      libcurl4-debuginfo-7.37.0-37.26.1

   - SUSE CaaS Platform 3.0 (x86_64):

      curl-7.37.0-37.26.1
      curl-debuginfo-7.37.0-37.26.1
      curl-debugsource-7.37.0-37.26.1
      libcurl4-7.37.0-37.26.1
      libcurl4-debuginfo-7.37.0-37.26.1

   - OpenStack Cloud Magnum Orchestration 7 (x86_64):

      curl-7.37.0-37.26.1
      curl-debuginfo-7.37.0-37.26.1
      curl-debugsource-7.37.0-37.26.1
      libcurl4-7.37.0-37.26.1
      libcurl4-debuginfo-7.37.0-37.26.1


References:

   https://www.suse.com/security/cve/CVE-2018-14618.html
   https://bugzilla.suse.com/1089533
   https://bugzilla.suse.com/1106019



More information about the sle-security-updates mailing list