-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: curl security and bug fix update
Advisory ID:       RHSA-2019:3701-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:3701
Issue date:        2019-11-05
CVE Names:         CVE-2018-16890 CVE-2018-20483 CVE-2019-3822 
                   CVE-2019-3823 
====================================================================
1. Summary:

An update for curl is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

The curl packages provide the libcurl library and the curl utility for
downloading files from servers using various protocols, including HTTP,
FTP, and LDAP.

Security Fix(es):

* curl: NTLM type-2 heap out-of-bounds buffer read (CVE-2018-16890)

* wget: Information exposure in set_file_metadata function in xattr.c
(CVE-2018-20483)

* curl: NTLMv2 type-3 header stack buffer overflow (CVE-2019-3822)

* curl: SMTP end-of-response out-of-bounds read (CVE-2019-3823)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.1 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1662705 - CVE-2018-20483 wget: Information exposure in set_file_metadata function in xattr.c
1669156 - connection re-use does not work for SCP and SFTP
1670252 - CVE-2018-16890 curl: NTLM type-2 heap out-of-bounds buffer read
1670254 - CVE-2019-3822 curl: NTLMv2 type-3 header stack buffer overflow
1670256 - CVE-2019-3823 curl: SMTP end-of-response out-of-bounds read

6. Package List:

Red Hat Enterprise Linux BaseOS (v. 8):

Source:
curl-7.61.1-11.el8.src.rpm

aarch64:
curl-7.61.1-11.el8.aarch64.rpm
curl-debuginfo-7.61.1-11.el8.aarch64.rpm
curl-debugsource-7.61.1-11.el8.aarch64.rpm
curl-minimal-debuginfo-7.61.1-11.el8.aarch64.rpm
libcurl-7.61.1-11.el8.aarch64.rpm
libcurl-debuginfo-7.61.1-11.el8.aarch64.rpm
libcurl-devel-7.61.1-11.el8.aarch64.rpm
libcurl-minimal-7.61.1-11.el8.aarch64.rpm
libcurl-minimal-debuginfo-7.61.1-11.el8.aarch64.rpm

ppc64le:
curl-7.61.1-11.el8.ppc64le.rpm
curl-debuginfo-7.61.1-11.el8.ppc64le.rpm
curl-debugsource-7.61.1-11.el8.ppc64le.rpm
curl-minimal-debuginfo-7.61.1-11.el8.ppc64le.rpm
libcurl-7.61.1-11.el8.ppc64le.rpm
libcurl-debuginfo-7.61.1-11.el8.ppc64le.rpm
libcurl-devel-7.61.1-11.el8.ppc64le.rpm
libcurl-minimal-7.61.1-11.el8.ppc64le.rpm
libcurl-minimal-debuginfo-7.61.1-11.el8.ppc64le.rpm

s390x:
curl-7.61.1-11.el8.s390x.rpm
curl-debuginfo-7.61.1-11.el8.s390x.rpm
curl-debugsource-7.61.1-11.el8.s390x.rpm
curl-minimal-debuginfo-7.61.1-11.el8.s390x.rpm
libcurl-7.61.1-11.el8.s390x.rpm
libcurl-debuginfo-7.61.1-11.el8.s390x.rpm
libcurl-devel-7.61.1-11.el8.s390x.rpm
libcurl-minimal-7.61.1-11.el8.s390x.rpm
libcurl-minimal-debuginfo-7.61.1-11.el8.s390x.rpm

x86_64:
curl-7.61.1-11.el8.x86_64.rpm
curl-debuginfo-7.61.1-11.el8.i686.rpm
curl-debuginfo-7.61.1-11.el8.x86_64.rpm
curl-debugsource-7.61.1-11.el8.i686.rpm
curl-debugsource-7.61.1-11.el8.x86_64.rpm
curl-minimal-debuginfo-7.61.1-11.el8.i686.rpm
curl-minimal-debuginfo-7.61.1-11.el8.x86_64.rpm
libcurl-7.61.1-11.el8.i686.rpm
libcurl-7.61.1-11.el8.x86_64.rpm
libcurl-debuginfo-7.61.1-11.el8.i686.rpm
libcurl-debuginfo-7.61.1-11.el8.x86_64.rpm
libcurl-devel-7.61.1-11.el8.i686.rpm
libcurl-devel-7.61.1-11.el8.x86_64.rpm
libcurl-minimal-7.61.1-11.el8.i686.rpm
libcurl-minimal-7.61.1-11.el8.x86_64.rpm
libcurl-minimal-debuginfo-7.61.1-11.el8.i686.rpm
libcurl-minimal-debuginfo-7.61.1-11.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-16890
https://access.redhat.com/security/cve/CVE-2018-20483
https://access.redhat.com/security/cve/CVE-2019-3822
https://access.redhat.com/security/cve/CVE-2019-3823
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----Version: GnuPG v1
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8Z+p
-----END PGP SIGNATURE-------RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2019-3701:01 Moderate: curl security and bug fix update

An update for curl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate

Summary

The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: NTLM type-2 heap out-of-bounds buffer read (CVE-2018-16890)
* wget: Information exposure in set_file_metadata function in xattr.c (CVE-2018-20483)
* curl: NTLMv2 type-3 header stack buffer overflow (CVE-2019-3822)
* curl: SMTP end-of-response out-of-bounds read (CVE-2019-3823)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2018-16890 https://access.redhat.com/security/cve/CVE-2018-20483 https://access.redhat.com/security/cve/CVE-2019-3822 https://access.redhat.com/security/cve/CVE-2019-3823 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/

Package List

Red Hat Enterprise Linux BaseOS (v. 8):
Source: curl-7.61.1-11.el8.src.rpm
aarch64: curl-7.61.1-11.el8.aarch64.rpm curl-debuginfo-7.61.1-11.el8.aarch64.rpm curl-debugsource-7.61.1-11.el8.aarch64.rpm curl-minimal-debuginfo-7.61.1-11.el8.aarch64.rpm libcurl-7.61.1-11.el8.aarch64.rpm libcurl-debuginfo-7.61.1-11.el8.aarch64.rpm libcurl-devel-7.61.1-11.el8.aarch64.rpm libcurl-minimal-7.61.1-11.el8.aarch64.rpm libcurl-minimal-debuginfo-7.61.1-11.el8.aarch64.rpm
ppc64le: curl-7.61.1-11.el8.ppc64le.rpm curl-debuginfo-7.61.1-11.el8.ppc64le.rpm curl-debugsource-7.61.1-11.el8.ppc64le.rpm curl-minimal-debuginfo-7.61.1-11.el8.ppc64le.rpm libcurl-7.61.1-11.el8.ppc64le.rpm libcurl-debuginfo-7.61.1-11.el8.ppc64le.rpm libcurl-devel-7.61.1-11.el8.ppc64le.rpm libcurl-minimal-7.61.1-11.el8.ppc64le.rpm libcurl-minimal-debuginfo-7.61.1-11.el8.ppc64le.rpm
s390x: curl-7.61.1-11.el8.s390x.rpm curl-debuginfo-7.61.1-11.el8.s390x.rpm curl-debugsource-7.61.1-11.el8.s390x.rpm curl-minimal-debuginfo-7.61.1-11.el8.s390x.rpm libcurl-7.61.1-11.el8.s390x.rpm libcurl-debuginfo-7.61.1-11.el8.s390x.rpm libcurl-devel-7.61.1-11.el8.s390x.rpm libcurl-minimal-7.61.1-11.el8.s390x.rpm libcurl-minimal-debuginfo-7.61.1-11.el8.s390x.rpm
x86_64: curl-7.61.1-11.el8.x86_64.rpm curl-debuginfo-7.61.1-11.el8.i686.rpm curl-debuginfo-7.61.1-11.el8.x86_64.rpm curl-debugsource-7.61.1-11.el8.i686.rpm curl-debugsource-7.61.1-11.el8.x86_64.rpm curl-minimal-debuginfo-7.61.1-11.el8.i686.rpm curl-minimal-debuginfo-7.61.1-11.el8.x86_64.rpm libcurl-7.61.1-11.el8.i686.rpm libcurl-7.61.1-11.el8.x86_64.rpm libcurl-debuginfo-7.61.1-11.el8.i686.rpm libcurl-debuginfo-7.61.1-11.el8.x86_64.rpm libcurl-devel-7.61.1-11.el8.i686.rpm libcurl-devel-7.61.1-11.el8.x86_64.rpm libcurl-minimal-7.61.1-11.el8.i686.rpm libcurl-minimal-7.61.1-11.el8.x86_64.rpm libcurl-minimal-debuginfo-7.61.1-11.el8.i686.rpm libcurl-minimal-debuginfo-7.61.1-11.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2019:3701-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:3701
Issued Date: : 2019-11-05
CVE Names: CVE-2018-16890 CVE-2018-20483 CVE-2019-3822 CVE-2019-3823

Topic

An update for curl is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

1662705 - CVE-2018-20483 wget: Information exposure in set_file_metadata function in xattr.c

1669156 - connection re-use does not work for SCP and SFTP

1670252 - CVE-2018-16890 curl: NTLM type-2 heap out-of-bounds buffer read

1670254 - CVE-2019-3822 curl: NTLMv2 type-3 header stack buffer overflow

1670256 - CVE-2019-3823 curl: SMTP end-of-response out-of-bounds read


Related News