SUSE-SU-2018:3608-1: moderate: Security update for curl

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Nov 2 14:09:51 MDT 2018


   SUSE Security Update: Security update for curl
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3608-1
Rating:             moderate
References:         #1112758 #1113660 
Cross-References:   CVE-2018-16840 CVE-2018-16842
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP3
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP3
                    SUSE CaaS Platform ALL
                    SUSE CaaS Platform 3.0
                    OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:

   This update for curl fixes the following issues:

   - CVE-2018-16840: A use after free in closing SASL handles was fixed
     (bsc#1112758)
   - CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which
     could lead to crashes (bsc#1113660)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP3:

      zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-2563=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2563=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-2563=1

   - SUSE CaaS Platform ALL:

      To install this update, use the SUSE CaaS Platform Velum dashboard.
      It will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.

   - SUSE CaaS Platform 3.0:

      To install this update, use the SUSE CaaS Platform Velum dashboard.
      It will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.

   - OpenStack Cloud Magnum Orchestration 7:

      zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2563=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

      curl-debuginfo-7.37.0-37.31.1
      curl-debugsource-7.37.0-37.31.1
      libcurl-devel-7.37.0-37.31.1

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      curl-7.37.0-37.31.1
      curl-debuginfo-7.37.0-37.31.1
      curl-debugsource-7.37.0-37.31.1
      libcurl4-7.37.0-37.31.1
      libcurl4-debuginfo-7.37.0-37.31.1

   - SUSE Linux Enterprise Server 12-SP3 (s390x x86_64):

      libcurl4-32bit-7.37.0-37.31.1
      libcurl4-debuginfo-32bit-7.37.0-37.31.1

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      curl-7.37.0-37.31.1
      curl-debuginfo-7.37.0-37.31.1
      curl-debugsource-7.37.0-37.31.1
      libcurl4-32bit-7.37.0-37.31.1
      libcurl4-7.37.0-37.31.1
      libcurl4-debuginfo-32bit-7.37.0-37.31.1
      libcurl4-debuginfo-7.37.0-37.31.1

   - SUSE CaaS Platform ALL (x86_64):

      curl-7.37.0-37.31.1
      curl-debuginfo-7.37.0-37.31.1
      curl-debugsource-7.37.0-37.31.1
      libcurl4-7.37.0-37.31.1
      libcurl4-debuginfo-7.37.0-37.31.1

   - SUSE CaaS Platform 3.0 (x86_64):

      curl-7.37.0-37.31.1
      curl-debuginfo-7.37.0-37.31.1
      curl-debugsource-7.37.0-37.31.1
      libcurl4-7.37.0-37.31.1
      libcurl4-debuginfo-7.37.0-37.31.1

   - OpenStack Cloud Magnum Orchestration 7 (x86_64):

      curl-7.37.0-37.31.1
      curl-debuginfo-7.37.0-37.31.1
      curl-debugsource-7.37.0-37.31.1
      libcurl4-7.37.0-37.31.1
      libcurl4-debuginfo-7.37.0-37.31.1


References:

   https://www.suse.com/security/cve/CVE-2018-16840.html
   https://www.suse.com/security/cve/CVE-2018-16842.html
   https://bugzilla.suse.com/1112758
   https://bugzilla.suse.com/1113660



More information about the sle-updates mailing list