SUSE: 2019:0249-2 important: curl
Summary
This update for curl fixes the following issues: Security issues fixed: - CVE-2019-3823: Fixed a heap out-of-bounds read in the code handling the end-of-response for SMTP (bsc#1123378). - CVE-2019-3822: Fixed a stack based buffer overflow in the function creating an outgoing NTLM type-3 message (bsc#1123377). - CVE-2018-16890: Fixed a heap buffer out-of-bounds read in the function handling incoming NTLM type-2 messages (bsc#1123371). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12-SP1: zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-249=1 Package List: - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64): curl-7.37.0-37.34.1 curl-debuginfo-7.37.0-37.34.1 curl-debugsource-7.37.0-37.34.1 libcurl4-32bit-7.37.0-37.34.1 libcurl4-7.37.0-37.34.1 libcurl4-debuginfo-32bit-7.37.0-37.34.1 libcurl4-debuginfo-7.37.0-37.34.1
References
#1123371 #1123377 #1123378
Cross- CVE-2018-16890 CVE-2019-3822 CVE-2019-3823
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
https://www.suse.com/security/cve/CVE-2018-16890.html
https://www.suse.com/security/cve/CVE-2019-3822.html
https://www.suse.com/security/cve/CVE-2019-3823.html
https://bugzilla.suse.com/1123371
https://bugzilla.suse.com/1123377
https://bugzilla.suse.com/1123378