Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2018-16840
Vulnerability from cvelistv5
Published
2018-10-31 18:00
Modified
2024-08-05 10:32
Severity ?
EPSS score ?
Summary
A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl |
Version: from 7.59.0 to 7.61.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T10:32:53.993Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-201903-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-03", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f", }, { name: "1042013", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1042013", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, { name: "USN-3805-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3805-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl", vendor: "The Curl Project", versions: [ { status: "affected", version: "from 7.59.0 to 7.61.1", }, ], }, ], datePublic: "2018-10-31T00:00:00", descriptions: [ { lang: "en", value: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-03-11T09:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "GLSA-201903-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-03", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f", }, { name: "1042013", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1042013", }, { tags: [ "x_refsource_MISC", ], url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, { name: "USN-3805-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3805-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-16840", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl", version: { version_data: [ { version_value: "from 7.59.0 to 7.61.1", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", }, ], }, impact: { cvss: [ [ { vectorString: "4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-416", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-201903-03", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-03", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840", }, { name: "https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f", refsource: "CONFIRM", url: "https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f", }, { name: "1042013", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1042013", }, { name: "https://curl.haxx.se/docs/CVE-2018-16840.html", refsource: "MISC", url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, { name: "USN-3805-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3805-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2018-16840", datePublished: "2018-10-31T18:00:00", dateReserved: "2018-09-11T00:00:00", dateUpdated: "2024-08-05T10:32:53.993Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"7.59.0\", \"versionEndIncluding\": \"7.61.1\", \"matchCriteriaId\": \"221B8B10-497F-42ED-B4E1-0E02B6F0C6A1\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07C312A0-CD2C-4B9C-B064-6409B25C278F\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.\"}, {\"lang\": \"es\", \"value\": \"Se ha detectado un error de uso de memoria din\\u00e1mica (heap) previamente liberada en Curl, desde la versi\\u00f3n 7.59.0 hasta la 7.61.1, en el c\\u00f3digo relacionado con el cierre de un controlador \\\"easy\\\". Al cerrar y limpiar un controlador \\\"easy\\\" en la funci\\u00f3n \\\"Curl_close()\\\", el c\\u00f3digo de la biblioteca libera, en primer lugar, un struct (sin pasar el puntero a null) y, despu\\u00e9s, podr\\u00eda escribir err\\u00f3neamente en un campo struct dentro del struct ya liberado.\"}]", id: "CVE-2018-16840", lastModified: "2024-11-21T03:53:25.240", metrics: "{\"cvssMetricV30\": [{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 1.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2018-10-31T18:29:00.307", references: "[{\"url\": \"http://www.securitytracker.com/id/1042013\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://curl.haxx.se/docs/CVE-2018-16840.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201903-03\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3805-1/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1042013\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://curl.haxx.se/docs/CVE-2018-16840.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201903-03\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3805-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2018-16840\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-10-31T18:29:00.307\",\"lastModified\":\"2024-11-21T03:53:25.240\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado un error de uso de memoria dinámica (heap) previamente liberada en Curl, desde la versión 7.59.0 hasta la 7.61.1, en el código relacionado con el cierre de un controlador \\\"easy\\\". Al cerrar y limpiar un controlador \\\"easy\\\" en la función \\\"Curl_close()\\\", el código de la biblioteca libera, en primer lugar, un struct (sin pasar el puntero a null) y, después, podría escribir erróneamente en un campo struct dentro del struct ya liberado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.59.0\",\"versionEndIncluding\":\"7.61.1\",\"matchCriteriaId\":\"221B8B10-497F-42ED-B4E1-0E02B6F0C6A1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C312A0-CD2C-4B9C-B064-6409B25C278F\"}]}]}],\"references\":[{\"url\":\"http://www.securitytracker.com/id/1042013\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://curl.haxx.se/docs/CVE-2018-16840.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201903-03\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3805-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1042013\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://curl.haxx.se/docs/CVE-2018-16840.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201903-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3805-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
gsd-2018-16840
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.
Aliases
Aliases
{ GSD: { alias: "CVE-2018-16840", description: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", id: "GSD-2018-16840", references: [ "https://www.suse.com/security/cve/CVE-2018-16840.html", "https://access.redhat.com/errata/RHSA-2019:1543", "https://ubuntu.com/security/CVE-2018-16840", "https://security.archlinux.org/CVE-2018-16840", "https://alas.aws.amazon.com/cve/html/CVE-2018-16840.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2018-16840", ], details: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", id: "GSD-2018-16840", modified: "2023-12-13T01:22:26.090176Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-16840", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl", version: { version_data: [ { version_value: "from 7.59.0 to 7.61.1", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", }, ], }, impact: { cvss: [ [ { vectorString: "4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-416", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-201903-03", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-03", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840", }, { name: "https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f", refsource: "CONFIRM", url: "https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f", }, { name: "1042013", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1042013", }, { name: "https://curl.haxx.se/docs/CVE-2018-16840.html", refsource: "MISC", url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, { name: "USN-3805-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3805-1/", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "7.61.1", versionStartIncluding: "7.59.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-16840", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-416", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f", refsource: "CONFIRM", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f", }, { name: "https://curl.haxx.se/docs/CVE-2018-16840.html", refsource: "MISC", tags: [ "Patch", "Vendor Advisory", ], url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840", refsource: "CONFIRM", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840", }, { name: "USN-3805-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3805-1/", }, { name: "1042013", refsource: "SECTRACK", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1042013", }, { name: "GLSA-201903-03", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-03", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, }, }, lastModifiedDate: "2019-10-09T23:36Z", publishedDate: "2018-10-31T18:29Z", }, }, }
suse-su-2018:3681-1
Vulnerability from csaf_suse
Published
2018-11-08 16:55
Modified
2018-11-08 16:55
Summary
Security update for curl
Notes
Title of the patch
Security update for curl
Description of the patch
This update for curl fixes the following issues:
- CVE-2018-16840: A use-after-free in SASL handle close was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)
Patchnames
sdksp4-curl-13861,secsp3-curl-13861,slessp4-curl-13861
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for curl", title: "Title of the patch", }, { category: "description", text: "This update for curl fixes the following issues:\n\n- CVE-2018-16840: A use-after-free in SASL handle close was fixed (bsc#1112758)\n- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)\n\n", title: "Description of the patch", }, { category: "details", text: "sdksp4-curl-13861,secsp3-curl-13861,slessp4-curl-13861", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3681-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3681-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183681-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3681-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004839.html", }, { category: "self", summary: "SUSE Bug 1112758", url: "https://bugzilla.suse.com/1112758", }, { category: "self", summary: "SUSE Bug 1113660", url: "https://bugzilla.suse.com/1113660", }, { category: "self", summary: "SUSE CVE CVE-2018-16840 page", url: "https://www.suse.com/security/cve/CVE-2018-16840/", }, { category: "self", summary: "SUSE CVE CVE-2018-16842 page", url: "https://www.suse.com/security/cve/CVE-2018-16842/", }, ], title: "Security update for curl", tracking: { current_release_date: "2018-11-08T16:55:53Z", generator: { date: "2018-11-08T16:55:53Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3681-1", initial_release_date: "2018-11-08T16:55:53Z", revision_history: [ { date: "2018-11-08T16:55:53Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libcurl-devel-7.37.0-70.38.1.i586", product: { name: "libcurl-devel-7.37.0-70.38.1.i586", product_id: "libcurl-devel-7.37.0-70.38.1.i586", }, }, { category: "product_version", name: "curl-openssl1-7.37.0-70.38.1.i586", product: { name: "curl-openssl1-7.37.0-70.38.1.i586", product_id: "curl-openssl1-7.37.0-70.38.1.i586", }, }, { category: "product_version", name: "libcurl4-openssl1-7.37.0-70.38.1.i586", product: { name: "libcurl4-openssl1-7.37.0-70.38.1.i586", product_id: "libcurl4-openssl1-7.37.0-70.38.1.i586", }, }, { category: "product_version", name: "curl-7.37.0-70.38.1.i586", product: { name: "curl-7.37.0-70.38.1.i586", product_id: "curl-7.37.0-70.38.1.i586", }, }, { category: "product_version", name: "libcurl4-7.37.0-70.38.1.i586", product: { name: "libcurl4-7.37.0-70.38.1.i586", product_id: "libcurl4-7.37.0-70.38.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "libcurl-devel-7.37.0-70.38.1.ia64", product: { name: "libcurl-devel-7.37.0-70.38.1.ia64", product_id: "libcurl-devel-7.37.0-70.38.1.ia64", }, }, { category: "product_version", name: "curl-openssl1-7.37.0-70.38.1.ia64", product: { name: "curl-openssl1-7.37.0-70.38.1.ia64", product_id: "curl-openssl1-7.37.0-70.38.1.ia64", }, }, { category: "product_version", name: "libcurl4-openssl1-7.37.0-70.38.1.ia64", product: { name: "libcurl4-openssl1-7.37.0-70.38.1.ia64", product_id: "libcurl4-openssl1-7.37.0-70.38.1.ia64", }, }, { category: "product_version", name: "libcurl4-openssl1-x86-7.37.0-70.38.1.ia64", product: { name: "libcurl4-openssl1-x86-7.37.0-70.38.1.ia64", product_id: "libcurl4-openssl1-x86-7.37.0-70.38.1.ia64", }, }, { category: "product_version", name: "curl-7.37.0-70.38.1.ia64", product: { name: "curl-7.37.0-70.38.1.ia64", product_id: "curl-7.37.0-70.38.1.ia64", }, }, { category: "product_version", name: "libcurl4-7.37.0-70.38.1.ia64", product: { name: "libcurl4-7.37.0-70.38.1.ia64", product_id: "libcurl4-7.37.0-70.38.1.ia64", }, }, { category: "product_version", name: "libcurl4-x86-7.37.0-70.38.1.ia64", product: { name: "libcurl4-x86-7.37.0-70.38.1.ia64", product_id: "libcurl4-x86-7.37.0-70.38.1.ia64", }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "libcurl-devel-7.37.0-70.38.1.ppc64", product: { name: "libcurl-devel-7.37.0-70.38.1.ppc64", product_id: "libcurl-devel-7.37.0-70.38.1.ppc64", }, }, { category: "product_version", name: "curl-openssl1-7.37.0-70.38.1.ppc64", product: { name: "curl-openssl1-7.37.0-70.38.1.ppc64", product_id: "curl-openssl1-7.37.0-70.38.1.ppc64", }, }, { category: "product_version", name: "libcurl4-openssl1-7.37.0-70.38.1.ppc64", product: { name: "libcurl4-openssl1-7.37.0-70.38.1.ppc64", product_id: "libcurl4-openssl1-7.37.0-70.38.1.ppc64", }, }, { category: "product_version", name: "libcurl4-openssl1-32bit-7.37.0-70.38.1.ppc64", product: { name: "libcurl4-openssl1-32bit-7.37.0-70.38.1.ppc64", product_id: "libcurl4-openssl1-32bit-7.37.0-70.38.1.ppc64", }, }, { category: "product_version", name: "curl-7.37.0-70.38.1.ppc64", product: { name: "curl-7.37.0-70.38.1.ppc64", product_id: "curl-7.37.0-70.38.1.ppc64", }, }, { category: "product_version", name: "libcurl4-7.37.0-70.38.1.ppc64", product: { name: "libcurl4-7.37.0-70.38.1.ppc64", product_id: "libcurl4-7.37.0-70.38.1.ppc64", }, }, { category: "product_version", name: "libcurl4-32bit-7.37.0-70.38.1.ppc64", product: { name: "libcurl4-32bit-7.37.0-70.38.1.ppc64", product_id: "libcurl4-32bit-7.37.0-70.38.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "libcurl-devel-7.37.0-70.38.1.s390x", product: { name: "libcurl-devel-7.37.0-70.38.1.s390x", product_id: "libcurl-devel-7.37.0-70.38.1.s390x", }, }, { category: "product_version", name: "curl-openssl1-7.37.0-70.38.1.s390x", product: { name: "curl-openssl1-7.37.0-70.38.1.s390x", product_id: "curl-openssl1-7.37.0-70.38.1.s390x", }, }, { category: "product_version", name: "libcurl4-openssl1-7.37.0-70.38.1.s390x", product: { name: "libcurl4-openssl1-7.37.0-70.38.1.s390x", product_id: "libcurl4-openssl1-7.37.0-70.38.1.s390x", }, }, { category: "product_version", name: "libcurl4-openssl1-32bit-7.37.0-70.38.1.s390x", product: { name: "libcurl4-openssl1-32bit-7.37.0-70.38.1.s390x", product_id: "libcurl4-openssl1-32bit-7.37.0-70.38.1.s390x", }, }, { category: "product_version", name: "curl-7.37.0-70.38.1.s390x", product: { name: "curl-7.37.0-70.38.1.s390x", product_id: "curl-7.37.0-70.38.1.s390x", }, }, { category: "product_version", name: "libcurl4-7.37.0-70.38.1.s390x", product: { name: "libcurl4-7.37.0-70.38.1.s390x", product_id: "libcurl4-7.37.0-70.38.1.s390x", }, }, { category: "product_version", name: "libcurl4-32bit-7.37.0-70.38.1.s390x", product: { name: "libcurl4-32bit-7.37.0-70.38.1.s390x", product_id: "libcurl4-32bit-7.37.0-70.38.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libcurl-devel-7.37.0-70.38.1.x86_64", product: { name: "libcurl-devel-7.37.0-70.38.1.x86_64", product_id: "libcurl-devel-7.37.0-70.38.1.x86_64", }, }, { category: "product_version", name: "curl-openssl1-7.37.0-70.38.1.x86_64", product: { name: "curl-openssl1-7.37.0-70.38.1.x86_64", product_id: "curl-openssl1-7.37.0-70.38.1.x86_64", }, }, { category: "product_version", name: "libcurl4-openssl1-7.37.0-70.38.1.x86_64", product: { name: "libcurl4-openssl1-7.37.0-70.38.1.x86_64", product_id: "libcurl4-openssl1-7.37.0-70.38.1.x86_64", }, }, { category: "product_version", name: "libcurl4-openssl1-32bit-7.37.0-70.38.1.x86_64", product: { name: "libcurl4-openssl1-32bit-7.37.0-70.38.1.x86_64", product_id: "libcurl4-openssl1-32bit-7.37.0-70.38.1.x86_64", }, }, { category: "product_version", name: "curl-7.37.0-70.38.1.x86_64", product: { name: "curl-7.37.0-70.38.1.x86_64", product_id: "curl-7.37.0-70.38.1.x86_64", }, }, { category: "product_version", name: "libcurl4-7.37.0-70.38.1.x86_64", product: { name: "libcurl4-7.37.0-70.38.1.x86_64", product_id: "libcurl4-7.37.0-70.38.1.x86_64", }, }, { category: "product_version", name: "libcurl4-32bit-7.37.0-70.38.1.x86_64", product: { name: "libcurl4-32bit-7.37.0-70.38.1.x86_64", product_id: "libcurl4-32bit-7.37.0-70.38.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 11 SP4", product: { name: "SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4", product_identification_helper: { cpe: "cpe:/a:suse:sle-sdk:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11-SECURITY", product: { name: "SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY", product_identification_helper: { cpe: "cpe:/o:suse:sles:11:security", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4", product: { name: "SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.37.0-70.38.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.i586", }, product_reference: "libcurl-devel-7.37.0-70.38.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.37.0-70.38.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ia64", }, product_reference: "libcurl-devel-7.37.0-70.38.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.37.0-70.38.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ppc64", }, product_reference: "libcurl-devel-7.37.0-70.38.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.37.0-70.38.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.s390x", }, product_reference: "libcurl-devel-7.37.0-70.38.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.37.0-70.38.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.x86_64", }, product_reference: "libcurl-devel-7.37.0-70.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-openssl1-7.37.0-70.38.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.i586", }, product_reference: "curl-openssl1-7.37.0-70.38.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "curl-openssl1-7.37.0-70.38.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ia64", }, product_reference: "curl-openssl1-7.37.0-70.38.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "curl-openssl1-7.37.0-70.38.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ppc64", }, product_reference: "curl-openssl1-7.37.0-70.38.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "curl-openssl1-7.37.0-70.38.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.s390x", }, product_reference: "curl-openssl1-7.37.0-70.38.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "curl-openssl1-7.37.0-70.38.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.x86_64", }, product_reference: "curl-openssl1-7.37.0-70.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libcurl4-openssl1-7.37.0-70.38.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.i586", }, product_reference: "libcurl4-openssl1-7.37.0-70.38.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libcurl4-openssl1-7.37.0-70.38.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ia64", }, product_reference: "libcurl4-openssl1-7.37.0-70.38.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libcurl4-openssl1-7.37.0-70.38.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ppc64", }, product_reference: "libcurl4-openssl1-7.37.0-70.38.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libcurl4-openssl1-7.37.0-70.38.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.s390x", }, product_reference: "libcurl4-openssl1-7.37.0-70.38.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libcurl4-openssl1-7.37.0-70.38.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.x86_64", }, product_reference: "libcurl4-openssl1-7.37.0-70.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libcurl4-openssl1-32bit-7.37.0-70.38.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.ppc64", }, product_reference: "libcurl4-openssl1-32bit-7.37.0-70.38.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libcurl4-openssl1-32bit-7.37.0-70.38.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.s390x", }, product_reference: "libcurl4-openssl1-32bit-7.37.0-70.38.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libcurl4-openssl1-32bit-7.37.0-70.38.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.x86_64", }, product_reference: "libcurl4-openssl1-32bit-7.37.0-70.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libcurl4-openssl1-x86-7.37.0-70.38.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-x86-7.37.0-70.38.1.ia64", }, product_reference: "libcurl4-openssl1-x86-7.37.0-70.38.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-70.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.i586", }, product_reference: "curl-7.37.0-70.38.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-70.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ia64", }, product_reference: "curl-7.37.0-70.38.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-70.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ppc64", }, product_reference: "curl-7.37.0-70.38.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-70.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.s390x", }, product_reference: "curl-7.37.0-70.38.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-70.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.x86_64", }, product_reference: "curl-7.37.0-70.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-70.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.i586", }, product_reference: "libcurl4-7.37.0-70.38.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-70.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ia64", }, product_reference: "libcurl4-7.37.0-70.38.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-70.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", }, product_reference: "libcurl4-7.37.0-70.38.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-70.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.s390x", }, product_reference: "libcurl4-7.37.0-70.38.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-70.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", }, product_reference: "libcurl4-7.37.0-70.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.37.0-70.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", }, product_reference: "libcurl4-32bit-7.37.0-70.38.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.37.0-70.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", }, product_reference: "libcurl4-32bit-7.37.0-70.38.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.37.0-70.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", }, product_reference: "libcurl4-32bit-7.37.0-70.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-x86-7.37.0-70.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", }, product_reference: "libcurl4-x86-7.37.0-70.38.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-70.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.i586", }, product_reference: "curl-7.37.0-70.38.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-70.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ia64", }, product_reference: "curl-7.37.0-70.38.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-70.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ppc64", }, product_reference: "curl-7.37.0-70.38.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-70.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.s390x", }, product_reference: "curl-7.37.0-70.38.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-70.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.x86_64", }, product_reference: "curl-7.37.0-70.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-70.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.i586", }, product_reference: "libcurl4-7.37.0-70.38.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-70.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ia64", }, product_reference: "libcurl4-7.37.0-70.38.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-70.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", }, product_reference: "libcurl4-7.37.0-70.38.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-70.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.s390x", }, product_reference: "libcurl4-7.37.0-70.38.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-70.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", }, product_reference: "libcurl4-7.37.0-70.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.37.0-70.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", }, product_reference: "libcurl4-32bit-7.37.0-70.38.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.37.0-70.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", }, product_reference: "libcurl4-32bit-7.37.0-70.38.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.37.0-70.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", }, product_reference: "libcurl4-32bit-7.37.0-70.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-x86-7.37.0-70.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", }, product_reference: "libcurl4-x86-7.37.0-70.38.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2018-16840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16840", }, ], notes: [ { category: "general", text: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16840", url: "https://www.suse.com/security/cve/CVE-2018-16840", }, { category: "external", summary: "SUSE Bug 1112758 for CVE-2018-16840", url: "https://bugzilla.suse.com/1112758", }, { category: "external", summary: "SUSE Bug 1113029 for CVE-2018-16840", url: "https://bugzilla.suse.com/1113029", }, { category: "external", summary: "SUSE Bug 1122464 for CVE-2018-16840", url: "https://bugzilla.suse.com/1122464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-08T16:55:53Z", details: "moderate", }, ], title: "CVE-2018-16840", }, { cve: "CVE-2018-16842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16842", }, ], notes: [ { category: "general", text: "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16842", url: "https://www.suse.com/security/cve/CVE-2018-16842", }, { category: "external", summary: "SUSE Bug 1113660 for CVE-2018-16842", url: "https://bugzilla.suse.com/1113660", }, { category: "external", summary: "SUSE Bug 1122464 for CVE-2018-16842", url: "https://bugzilla.suse.com/1122464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:curl-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:curl-openssl1-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libcurl4-openssl1-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:curl-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-32bit-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-7.37.0-70.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libcurl4-x86-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libcurl-devel-7.37.0-70.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-08T16:55:53Z", details: "moderate", }, ], title: "CVE-2018-16842", }, ], }
suse-su-2018:3608-1
Vulnerability from csaf_suse
Published
2018-11-02 16:09
Modified
2018-11-02 16:09
Summary
Security update for curl
Notes
Title of the patch
Security update for curl
Description of the patch
This update for curl fixes the following issues:
- CVE-2018-16840: A use after free in closing SASL handles was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)
Patchnames
SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2563,SUSE-SLE-DESKTOP-12-SP3-2018-2563,SUSE-SLE-SDK-12-SP3-2018-2563,SUSE-SLE-SERVER-12-SP3-2018-2563
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for curl", title: "Title of the patch", }, { category: "description", text: "This update for curl fixes the following issues:\n\n- CVE-2018-16840: A use after free in closing SASL handles was fixed (bsc#1112758)\n- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2563,SUSE-SLE-DESKTOP-12-SP3-2018-2563,SUSE-SLE-SDK-12-SP3-2018-2563,SUSE-SLE-SERVER-12-SP3-2018-2563", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3608-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3608-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183608-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3608-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004824.html", }, { category: "self", summary: "SUSE Bug 1112758", url: "https://bugzilla.suse.com/1112758", }, { category: "self", summary: "SUSE Bug 1113660", url: "https://bugzilla.suse.com/1113660", }, { category: "self", summary: "SUSE CVE CVE-2018-16840 page", url: "https://www.suse.com/security/cve/CVE-2018-16840/", }, { category: "self", summary: "SUSE CVE CVE-2018-16842 page", url: "https://www.suse.com/security/cve/CVE-2018-16842/", }, ], title: "Security update for curl", tracking: { current_release_date: "2018-11-02T16:09:57Z", generator: { date: "2018-11-02T16:09:57Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3608-1", initial_release_date: "2018-11-02T16:09:57Z", revision_history: [ { date: "2018-11-02T16:09:57Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libcurl-devel-7.37.0-37.31.1.aarch64", product: { name: "libcurl-devel-7.37.0-37.31.1.aarch64", product_id: "libcurl-devel-7.37.0-37.31.1.aarch64", }, }, { category: "product_version", name: "curl-7.37.0-37.31.1.aarch64", product: { name: "curl-7.37.0-37.31.1.aarch64", product_id: "curl-7.37.0-37.31.1.aarch64", }, }, { category: "product_version", name: "libcurl4-7.37.0-37.31.1.aarch64", product: { name: "libcurl4-7.37.0-37.31.1.aarch64", product_id: "libcurl4-7.37.0-37.31.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libcurl-devel-7.37.0-37.31.1.ppc64le", product: { name: "libcurl-devel-7.37.0-37.31.1.ppc64le", product_id: "libcurl-devel-7.37.0-37.31.1.ppc64le", }, }, { category: "product_version", name: "curl-7.37.0-37.31.1.ppc64le", product: { name: "curl-7.37.0-37.31.1.ppc64le", product_id: "curl-7.37.0-37.31.1.ppc64le", }, }, { category: "product_version", name: "libcurl4-7.37.0-37.31.1.ppc64le", product: { name: "libcurl4-7.37.0-37.31.1.ppc64le", product_id: "libcurl4-7.37.0-37.31.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libcurl-devel-7.37.0-37.31.1.s390x", product: { name: "libcurl-devel-7.37.0-37.31.1.s390x", product_id: "libcurl-devel-7.37.0-37.31.1.s390x", }, }, { category: "product_version", name: "curl-7.37.0-37.31.1.s390x", product: { name: "curl-7.37.0-37.31.1.s390x", product_id: "curl-7.37.0-37.31.1.s390x", }, }, { category: "product_version", name: "libcurl4-7.37.0-37.31.1.s390x", product: { name: "libcurl4-7.37.0-37.31.1.s390x", product_id: "libcurl4-7.37.0-37.31.1.s390x", }, }, { category: "product_version", name: "libcurl4-32bit-7.37.0-37.31.1.s390x", product: { name: "libcurl4-32bit-7.37.0-37.31.1.s390x", product_id: "libcurl4-32bit-7.37.0-37.31.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "curl-7.37.0-37.31.1.x86_64", product: { name: "curl-7.37.0-37.31.1.x86_64", product_id: "curl-7.37.0-37.31.1.x86_64", }, }, { category: "product_version", name: "libcurl4-7.37.0-37.31.1.x86_64", product: { name: "libcurl4-7.37.0-37.31.1.x86_64", product_id: "libcurl4-7.37.0-37.31.1.x86_64", }, }, { category: "product_version", name: "libcurl4-32bit-7.37.0-37.31.1.x86_64", product: { name: "libcurl4-32bit-7.37.0-37.31.1.x86_64", product_id: "libcurl4-32bit-7.37.0-37.31.1.x86_64", }, }, { category: "product_version", name: "libcurl-devel-7.37.0-37.31.1.x86_64", product: { name: "libcurl-devel-7.37.0-37.31.1.x86_64", product_id: "libcurl-devel-7.37.0-37.31.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP3", product: { name: "SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "curl-7.37.0-37.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:curl-7.37.0-37.31.1.x86_64", }, product_reference: "curl-7.37.0-37.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-37.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", }, product_reference: "libcurl4-7.37.0-37.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.37.0-37.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", }, product_reference: "libcurl4-32bit-7.37.0-37.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.37.0-37.31.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.aarch64", }, product_reference: "libcurl-devel-7.37.0-37.31.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.37.0-37.31.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.ppc64le", }, product_reference: "libcurl-devel-7.37.0-37.31.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.37.0-37.31.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.s390x", }, product_reference: "libcurl-devel-7.37.0-37.31.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.37.0-37.31.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.x86_64", }, product_reference: "libcurl-devel-7.37.0-37.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-37.31.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.aarch64", }, product_reference: "curl-7.37.0-37.31.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-37.31.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.ppc64le", }, product_reference: "curl-7.37.0-37.31.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-37.31.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.s390x", }, product_reference: "curl-7.37.0-37.31.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-37.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.x86_64", }, product_reference: "curl-7.37.0-37.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-37.31.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", }, product_reference: "libcurl4-7.37.0-37.31.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-37.31.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", }, product_reference: "libcurl4-7.37.0-37.31.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-37.31.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.s390x", }, product_reference: "libcurl4-7.37.0-37.31.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-37.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", }, product_reference: "libcurl4-7.37.0-37.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.37.0-37.31.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", }, product_reference: "libcurl4-32bit-7.37.0-37.31.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.37.0-37.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", }, product_reference: "libcurl4-32bit-7.37.0-37.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-37.31.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.aarch64", }, product_reference: "curl-7.37.0-37.31.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-37.31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.ppc64le", }, product_reference: "curl-7.37.0-37.31.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-37.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.s390x", }, product_reference: "curl-7.37.0-37.31.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "curl-7.37.0-37.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.x86_64", }, product_reference: "curl-7.37.0-37.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-37.31.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", }, product_reference: "libcurl4-7.37.0-37.31.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-37.31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", }, product_reference: "libcurl4-7.37.0-37.31.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-37.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.s390x", }, product_reference: "libcurl4-7.37.0-37.31.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.37.0-37.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", }, product_reference: "libcurl4-7.37.0-37.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.37.0-37.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", }, product_reference: "libcurl4-32bit-7.37.0-37.31.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.37.0-37.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", }, product_reference: "libcurl4-32bit-7.37.0-37.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2018-16840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16840", }, ], notes: [ { category: "general", text: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16840", url: "https://www.suse.com/security/cve/CVE-2018-16840", }, { category: "external", summary: "SUSE Bug 1112758 for CVE-2018-16840", url: "https://bugzilla.suse.com/1112758", }, { category: "external", summary: "SUSE Bug 1113029 for CVE-2018-16840", url: "https://bugzilla.suse.com/1113029", }, { category: "external", summary: "SUSE Bug 1122464 for CVE-2018-16840", url: "https://bugzilla.suse.com/1122464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-02T16:09:57Z", details: "moderate", }, ], title: "CVE-2018-16840", }, { cve: "CVE-2018-16842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16842", }, ], notes: [ { category: "general", text: "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16842", url: "https://www.suse.com/security/cve/CVE-2018-16842", }, { category: "external", summary: "SUSE Bug 1113660 for CVE-2018-16842", url: "https://bugzilla.suse.com/1113660", }, { category: "external", summary: "SUSE Bug 1122464 for CVE-2018-16842", url: "https://bugzilla.suse.com/1122464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:curl-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-32bit-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libcurl4-7.37.0-37.31.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libcurl-devel-7.37.0-37.31.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-02T16:09:57Z", details: "moderate", }, ], title: "CVE-2018-16842", }, ], }
suse-su-2019:0339-1
Vulnerability from csaf_suse
Published
2019-02-13 07:33
Modified
2019-02-13 07:33
Summary
Security update for curl
Notes
Title of the patch
Security update for curl
Description of the patch
This update for curl fixes the following issues:
Security issues fixed:
- CVE-2019-3822: Fixed a NTLMv2 type-3 header stack buffer overflow (bsc#1123377).
- CVE-2019-3823: Fixed an out-of-bounds read in the SMTP end-of-response (bsc#1123378).
- CVE-2018-16890: Fixed an out-of-bounds buffer read in NTLM type2 (bsc#1123371).
- CVE-2018-16842: Fixed an out-of-bounds read in tool_msgs.c (bsc#1113660).
- CVE-2018-16840: Fixed a use-after-free in handle close (bsc#1113029).
- CVE-2018-16839: Fixed an SASL password overflow caused by an integer overflow (bsc#1112758).
Patchnames
SUSE-2019-339,SUSE-SLE-DESKTOP-12-SP4-2019-339,SUSE-SLE-SDK-12-SP4-2019-339,SUSE-SLE-SERVER-12-SP4-2019-339
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for curl", title: "Title of the patch", }, { category: "description", text: "This update for curl fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-3822: Fixed a NTLMv2 type-3 header stack buffer overflow (bsc#1123377).\n- CVE-2019-3823: Fixed an out-of-bounds read in the SMTP end-of-response (bsc#1123378).\n- CVE-2018-16890: Fixed an out-of-bounds buffer read in NTLM type2 (bsc#1123371). \n- CVE-2018-16842: Fixed an out-of-bounds read in tool_msgs.c (bsc#1113660).\n- CVE-2018-16840: Fixed a use-after-free in handle close (bsc#1113029).\n- CVE-2018-16839: Fixed an SASL password overflow caused by an integer overflow (bsc#1112758).\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-339,SUSE-SLE-DESKTOP-12-SP4-2019-339,SUSE-SLE-SDK-12-SP4-2019-339,SUSE-SLE-SERVER-12-SP4-2019-339", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0339-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:0339-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190339-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:0339-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html", }, { category: "self", summary: "SUSE Bug 1112758", url: "https://bugzilla.suse.com/1112758", }, { category: "self", summary: "SUSE Bug 1113029", url: "https://bugzilla.suse.com/1113029", }, { category: "self", summary: "SUSE Bug 1113660", url: "https://bugzilla.suse.com/1113660", }, { category: "self", summary: "SUSE Bug 1123371", url: "https://bugzilla.suse.com/1123371", }, { category: "self", summary: "SUSE Bug 1123377", url: "https://bugzilla.suse.com/1123377", }, { category: "self", summary: "SUSE Bug 1123378", url: "https://bugzilla.suse.com/1123378", }, { category: "self", summary: "SUSE CVE CVE-2018-16839 page", url: "https://www.suse.com/security/cve/CVE-2018-16839/", }, { category: "self", summary: "SUSE CVE CVE-2018-16840 page", url: "https://www.suse.com/security/cve/CVE-2018-16840/", }, { category: "self", summary: "SUSE CVE CVE-2018-16842 page", url: "https://www.suse.com/security/cve/CVE-2018-16842/", }, { category: "self", summary: "SUSE CVE CVE-2018-16890 page", url: "https://www.suse.com/security/cve/CVE-2018-16890/", }, { category: "self", summary: "SUSE CVE CVE-2019-3822 page", url: "https://www.suse.com/security/cve/CVE-2019-3822/", }, { category: "self", summary: "SUSE CVE CVE-2019-3823 page", url: "https://www.suse.com/security/cve/CVE-2019-3823/", }, ], title: "Security update for curl", tracking: { current_release_date: "2019-02-13T07:33:54Z", generator: { date: "2019-02-13T07:33:54Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:0339-1", initial_release_date: "2019-02-13T07:33:54Z", revision_history: [ { date: "2019-02-13T07:33:54Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "curl-7.60.0-4.3.1.aarch64", product: { name: "curl-7.60.0-4.3.1.aarch64", product_id: "curl-7.60.0-4.3.1.aarch64", }, }, { category: "product_version", name: "curl-mini-7.60.0-4.3.1.aarch64", product: { name: "curl-mini-7.60.0-4.3.1.aarch64", product_id: "curl-mini-7.60.0-4.3.1.aarch64", }, }, { category: "product_version", name: "libcurl-devel-7.60.0-4.3.1.aarch64", product: { name: "libcurl-devel-7.60.0-4.3.1.aarch64", product_id: "libcurl-devel-7.60.0-4.3.1.aarch64", }, }, { category: "product_version", name: "libcurl-mini-devel-7.60.0-4.3.1.aarch64", product: { name: "libcurl-mini-devel-7.60.0-4.3.1.aarch64", product_id: "libcurl-mini-devel-7.60.0-4.3.1.aarch64", }, }, { category: "product_version", name: "libcurl4-7.60.0-4.3.1.aarch64", product: { name: "libcurl4-7.60.0-4.3.1.aarch64", product_id: "libcurl4-7.60.0-4.3.1.aarch64", }, }, { category: "product_version", name: "libcurl4-mini-7.60.0-4.3.1.aarch64", product: { name: "libcurl4-mini-7.60.0-4.3.1.aarch64", product_id: "libcurl4-mini-7.60.0-4.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libcurl-devel-64bit-7.60.0-4.3.1.aarch64_ilp32", product: { name: "libcurl-devel-64bit-7.60.0-4.3.1.aarch64_ilp32", product_id: "libcurl-devel-64bit-7.60.0-4.3.1.aarch64_ilp32", }, }, { category: "product_version", name: "libcurl4-64bit-7.60.0-4.3.1.aarch64_ilp32", product: { name: "libcurl4-64bit-7.60.0-4.3.1.aarch64_ilp32", product_id: "libcurl4-64bit-7.60.0-4.3.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "curl-7.60.0-4.3.1.i586", product: { name: "curl-7.60.0-4.3.1.i586", product_id: "curl-7.60.0-4.3.1.i586", }, }, { category: "product_version", name: "curl-mini-7.60.0-4.3.1.i586", product: { name: "curl-mini-7.60.0-4.3.1.i586", product_id: "curl-mini-7.60.0-4.3.1.i586", }, }, { category: "product_version", name: "libcurl-devel-7.60.0-4.3.1.i586", product: { name: "libcurl-devel-7.60.0-4.3.1.i586", product_id: "libcurl-devel-7.60.0-4.3.1.i586", }, }, { category: "product_version", name: "libcurl-mini-devel-7.60.0-4.3.1.i586", product: { name: "libcurl-mini-devel-7.60.0-4.3.1.i586", product_id: "libcurl-mini-devel-7.60.0-4.3.1.i586", }, }, { category: "product_version", name: "libcurl4-7.60.0-4.3.1.i586", product: { name: "libcurl4-7.60.0-4.3.1.i586", product_id: "libcurl4-7.60.0-4.3.1.i586", }, }, { category: "product_version", name: "libcurl4-mini-7.60.0-4.3.1.i586", product: { name: "libcurl4-mini-7.60.0-4.3.1.i586", product_id: "libcurl4-mini-7.60.0-4.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "curl-7.60.0-4.3.1.ppc64le", product: { name: "curl-7.60.0-4.3.1.ppc64le", product_id: "curl-7.60.0-4.3.1.ppc64le", }, }, { category: "product_version", name: "curl-mini-7.60.0-4.3.1.ppc64le", product: { name: "curl-mini-7.60.0-4.3.1.ppc64le", product_id: "curl-mini-7.60.0-4.3.1.ppc64le", }, }, { category: "product_version", name: "libcurl-devel-7.60.0-4.3.1.ppc64le", product: { name: "libcurl-devel-7.60.0-4.3.1.ppc64le", product_id: "libcurl-devel-7.60.0-4.3.1.ppc64le", }, }, { category: "product_version", name: "libcurl-mini-devel-7.60.0-4.3.1.ppc64le", product: { name: "libcurl-mini-devel-7.60.0-4.3.1.ppc64le", product_id: "libcurl-mini-devel-7.60.0-4.3.1.ppc64le", }, }, { category: "product_version", name: "libcurl4-7.60.0-4.3.1.ppc64le", product: { name: "libcurl4-7.60.0-4.3.1.ppc64le", product_id: "libcurl4-7.60.0-4.3.1.ppc64le", }, }, { category: "product_version", name: "libcurl4-mini-7.60.0-4.3.1.ppc64le", product: { name: "libcurl4-mini-7.60.0-4.3.1.ppc64le", product_id: "libcurl4-mini-7.60.0-4.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "curl-7.60.0-4.3.1.s390", product: { name: "curl-7.60.0-4.3.1.s390", product_id: "curl-7.60.0-4.3.1.s390", }, }, { category: "product_version", name: "curl-mini-7.60.0-4.3.1.s390", product: { name: "curl-mini-7.60.0-4.3.1.s390", product_id: "curl-mini-7.60.0-4.3.1.s390", }, }, { category: "product_version", name: "libcurl-devel-7.60.0-4.3.1.s390", product: { name: "libcurl-devel-7.60.0-4.3.1.s390", product_id: "libcurl-devel-7.60.0-4.3.1.s390", }, }, { category: "product_version", name: "libcurl-mini-devel-7.60.0-4.3.1.s390", product: { name: "libcurl-mini-devel-7.60.0-4.3.1.s390", product_id: "libcurl-mini-devel-7.60.0-4.3.1.s390", }, }, { category: "product_version", name: "libcurl4-7.60.0-4.3.1.s390", product: { name: "libcurl4-7.60.0-4.3.1.s390", product_id: "libcurl4-7.60.0-4.3.1.s390", }, }, { category: "product_version", name: "libcurl4-mini-7.60.0-4.3.1.s390", product: { name: "libcurl4-mini-7.60.0-4.3.1.s390", product_id: "libcurl4-mini-7.60.0-4.3.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "curl-7.60.0-4.3.1.s390x", product: { name: "curl-7.60.0-4.3.1.s390x", product_id: "curl-7.60.0-4.3.1.s390x", }, }, { category: "product_version", name: "curl-mini-7.60.0-4.3.1.s390x", product: { name: "curl-mini-7.60.0-4.3.1.s390x", product_id: "curl-mini-7.60.0-4.3.1.s390x", }, }, { category: "product_version", name: "libcurl-devel-7.60.0-4.3.1.s390x", product: { name: "libcurl-devel-7.60.0-4.3.1.s390x", product_id: "libcurl-devel-7.60.0-4.3.1.s390x", }, }, { category: "product_version", name: "libcurl-devel-32bit-7.60.0-4.3.1.s390x", product: { name: "libcurl-devel-32bit-7.60.0-4.3.1.s390x", product_id: "libcurl-devel-32bit-7.60.0-4.3.1.s390x", }, }, { category: "product_version", name: "libcurl-mini-devel-7.60.0-4.3.1.s390x", product: { name: "libcurl-mini-devel-7.60.0-4.3.1.s390x", product_id: "libcurl-mini-devel-7.60.0-4.3.1.s390x", }, }, { category: "product_version", name: "libcurl4-7.60.0-4.3.1.s390x", product: { name: "libcurl4-7.60.0-4.3.1.s390x", product_id: "libcurl4-7.60.0-4.3.1.s390x", }, }, { category: "product_version", name: "libcurl4-32bit-7.60.0-4.3.1.s390x", product: { name: "libcurl4-32bit-7.60.0-4.3.1.s390x", product_id: "libcurl4-32bit-7.60.0-4.3.1.s390x", }, }, { category: "product_version", name: "libcurl4-mini-7.60.0-4.3.1.s390x", product: { name: "libcurl4-mini-7.60.0-4.3.1.s390x", product_id: "libcurl4-mini-7.60.0-4.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "curl-7.60.0-4.3.1.x86_64", product: { name: "curl-7.60.0-4.3.1.x86_64", product_id: "curl-7.60.0-4.3.1.x86_64", }, }, { category: "product_version", name: "curl-mini-7.60.0-4.3.1.x86_64", product: { name: "curl-mini-7.60.0-4.3.1.x86_64", product_id: "curl-mini-7.60.0-4.3.1.x86_64", }, }, { category: "product_version", name: "libcurl-devel-7.60.0-4.3.1.x86_64", product: { name: "libcurl-devel-7.60.0-4.3.1.x86_64", product_id: "libcurl-devel-7.60.0-4.3.1.x86_64", }, }, { category: "product_version", name: "libcurl-devel-32bit-7.60.0-4.3.1.x86_64", product: { name: "libcurl-devel-32bit-7.60.0-4.3.1.x86_64", product_id: "libcurl-devel-32bit-7.60.0-4.3.1.x86_64", }, }, { category: "product_version", name: "libcurl-mini-devel-7.60.0-4.3.1.x86_64", product: { name: "libcurl-mini-devel-7.60.0-4.3.1.x86_64", product_id: "libcurl-mini-devel-7.60.0-4.3.1.x86_64", }, }, { category: "product_version", name: "libcurl4-7.60.0-4.3.1.x86_64", product: { name: "libcurl4-7.60.0-4.3.1.x86_64", product_id: "libcurl4-7.60.0-4.3.1.x86_64", }, }, { category: "product_version", name: "libcurl4-32bit-7.60.0-4.3.1.x86_64", product: { name: "libcurl4-32bit-7.60.0-4.3.1.x86_64", product_id: "libcurl4-32bit-7.60.0-4.3.1.x86_64", }, }, { category: "product_version", name: "libcurl4-mini-7.60.0-4.3.1.x86_64", product: { name: "libcurl4-mini-7.60.0-4.3.1.x86_64", product_id: "libcurl4-mini-7.60.0-4.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP4", product: { name: "SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4", product: { name: "SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "curl-7.60.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", }, product_reference: "curl-7.60.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.60.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", }, product_reference: "libcurl4-7.60.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.60.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", }, product_reference: "libcurl4-32bit-7.60.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.60.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", }, product_reference: "libcurl-devel-7.60.0-4.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.60.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", }, product_reference: "libcurl-devel-7.60.0-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.60.0-4.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", }, product_reference: "libcurl-devel-7.60.0-4.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.60.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", }, product_reference: "libcurl-devel-7.60.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.60.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", }, product_reference: "curl-7.60.0-4.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.60.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", }, product_reference: "curl-7.60.0-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.60.0-4.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", }, product_reference: "curl-7.60.0-4.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.60.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", }, product_reference: "curl-7.60.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.60.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", }, product_reference: "libcurl4-7.60.0-4.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.60.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", }, product_reference: "libcurl4-7.60.0-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.60.0-4.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", }, product_reference: "libcurl4-7.60.0-4.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.60.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", }, product_reference: "libcurl4-7.60.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.60.0-4.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", }, product_reference: "libcurl4-32bit-7.60.0-4.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.60.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", }, product_reference: "libcurl4-32bit-7.60.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.60.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", }, product_reference: "curl-7.60.0-4.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.60.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", }, product_reference: "curl-7.60.0-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.60.0-4.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", }, product_reference: "curl-7.60.0-4.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "curl-7.60.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", }, product_reference: "curl-7.60.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.60.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", }, product_reference: "libcurl4-7.60.0-4.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.60.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", }, product_reference: "libcurl4-7.60.0-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.60.0-4.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", }, product_reference: "libcurl4-7.60.0-4.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.60.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", }, product_reference: "libcurl4-7.60.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.60.0-4.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", }, product_reference: "libcurl4-32bit-7.60.0-4.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.60.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", }, product_reference: "libcurl4-32bit-7.60.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2018-16839", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16839", }, ], notes: [ { category: "general", text: "Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16839", url: "https://www.suse.com/security/cve/CVE-2018-16839", }, { category: "external", summary: "SUSE Bug 1112758 for CVE-2018-16839", url: "https://bugzilla.suse.com/1112758", }, { category: "external", summary: "SUSE Bug 1113029 for CVE-2018-16839", url: "https://bugzilla.suse.com/1113029", }, { category: "external", summary: "SUSE Bug 1131886 for CVE-2018-16839", url: "https://bugzilla.suse.com/1131886", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-13T07:33:54Z", details: "moderate", }, ], title: "CVE-2018-16839", }, { cve: "CVE-2018-16840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16840", }, ], notes: [ { category: "general", text: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16840", url: "https://www.suse.com/security/cve/CVE-2018-16840", }, { category: "external", summary: "SUSE Bug 1112758 for CVE-2018-16840", url: "https://bugzilla.suse.com/1112758", }, { category: "external", summary: "SUSE Bug 1113029 for CVE-2018-16840", url: "https://bugzilla.suse.com/1113029", }, { category: "external", summary: "SUSE Bug 1122464 for CVE-2018-16840", url: "https://bugzilla.suse.com/1122464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-13T07:33:54Z", details: "moderate", }, ], title: "CVE-2018-16840", }, { cve: "CVE-2018-16842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16842", }, ], notes: [ { category: "general", text: "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16842", url: "https://www.suse.com/security/cve/CVE-2018-16842", }, { category: "external", summary: "SUSE Bug 1113660 for CVE-2018-16842", url: "https://bugzilla.suse.com/1113660", }, { category: "external", summary: "SUSE Bug 1122464 for CVE-2018-16842", url: "https://bugzilla.suse.com/1122464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-13T07:33:54Z", details: "moderate", }, ], title: "CVE-2018-16842", }, { cve: "CVE-2018-16890", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16890", }, ], notes: [ { category: "general", text: "libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16890", url: "https://www.suse.com/security/cve/CVE-2018-16890", }, { category: "external", summary: "SUSE Bug 1123371 for CVE-2018-16890", url: "https://bugzilla.suse.com/1123371", }, { category: "external", summary: "SUSE Bug 1123378 for CVE-2018-16890", url: "https://bugzilla.suse.com/1123378", }, { category: "external", summary: "SUSE Bug 1141798 for CVE-2018-16890", url: "https://bugzilla.suse.com/1141798", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-13T07:33:54Z", details: "low", }, ], title: "CVE-2018-16890", }, { cve: "CVE-2019-3822", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3822", }, ], notes: [ { category: "general", text: "libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large 'nt response' data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a 'large value' needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3822", url: "https://www.suse.com/security/cve/CVE-2019-3822", }, { category: "external", summary: "SUSE Bug 1123377 for CVE-2019-3822", url: "https://bugzilla.suse.com/1123377", }, { category: "external", summary: "SUSE Bug 1141798 for CVE-2019-3822", url: "https://bugzilla.suse.com/1141798", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-13T07:33:54Z", details: "important", }, ], title: "CVE-2019-3822", }, { cve: "CVE-2019-3823", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3823", }, ], notes: [ { category: "general", text: "libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3823", url: "https://www.suse.com/security/cve/CVE-2019-3823", }, { category: "external", summary: "SUSE Bug 1123378 for CVE-2019-3823", url: "https://bugzilla.suse.com/1123378", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2019-3823", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1141798 for CVE-2019-3823", url: "https://bugzilla.suse.com/1141798", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:curl-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-32bit-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libcurl4-7.60.0-4.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libcurl-devel-7.60.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-13T07:33:54Z", details: "moderate", }, ], title: "CVE-2019-3823", }, ], }
suse-su-2018:3624-1
Vulnerability from csaf_suse
Published
2018-11-05 16:55
Modified
2018-11-05 16:55
Summary
Security update for curl
Notes
Title of the patch
Security update for curl
Description of the patch
This update for curl fixes the following issues:
- CVE-2018-16839: A SASL password overflow via integer overflow was fixed which could lead to crashes (bsc#1112758)
- CVE-2018-16840: A use-after-free in SASL handle close was fixed which could lead to crashes (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-2578,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2578
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for curl", title: "Title of the patch", }, { category: "description", text: "This update for curl fixes the following issues:\n\n- CVE-2018-16839: A SASL password overflow via integer overflow was fixed which could lead to crashes (bsc#1112758)\n- CVE-2018-16840: A use-after-free in SASL handle close was fixed which could lead to crashes (bsc#1112758)\n- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Basesystem-15-2018-2578,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2578", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3624-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3624-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183624-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3624-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004831.html", }, { category: "self", summary: "SUSE Bug 1112758", url: "https://bugzilla.suse.com/1112758", }, { category: "self", summary: "SUSE Bug 1113660", url: "https://bugzilla.suse.com/1113660", }, { category: "self", summary: "SUSE CVE CVE-2018-16839 page", url: "https://www.suse.com/security/cve/CVE-2018-16839/", }, { category: "self", summary: "SUSE CVE CVE-2018-16840 page", url: "https://www.suse.com/security/cve/CVE-2018-16840/", }, { category: "self", summary: "SUSE CVE CVE-2018-16842 page", url: "https://www.suse.com/security/cve/CVE-2018-16842/", }, ], title: "Security update for curl", tracking: { current_release_date: "2018-11-05T16:55:38Z", generator: { date: "2018-11-05T16:55:38Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3624-1", initial_release_date: "2018-11-05T16:55:38Z", revision_history: [ { date: "2018-11-05T16:55:38Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "curl-7.60.0-3.14.3.aarch64", product: { name: "curl-7.60.0-3.14.3.aarch64", product_id: "curl-7.60.0-3.14.3.aarch64", }, }, { category: "product_version", name: "libcurl-devel-7.60.0-3.14.3.aarch64", product: { name: "libcurl-devel-7.60.0-3.14.3.aarch64", product_id: "libcurl-devel-7.60.0-3.14.3.aarch64", }, }, { category: "product_version", name: "libcurl4-7.60.0-3.14.3.aarch64", product: { name: "libcurl4-7.60.0-3.14.3.aarch64", product_id: "libcurl4-7.60.0-3.14.3.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "curl-7.60.0-3.14.3.ppc64le", product: { name: "curl-7.60.0-3.14.3.ppc64le", product_id: "curl-7.60.0-3.14.3.ppc64le", }, }, { category: "product_version", name: "libcurl-devel-7.60.0-3.14.3.ppc64le", product: { name: "libcurl-devel-7.60.0-3.14.3.ppc64le", product_id: "libcurl-devel-7.60.0-3.14.3.ppc64le", }, }, { category: "product_version", name: "libcurl4-7.60.0-3.14.3.ppc64le", product: { name: "libcurl4-7.60.0-3.14.3.ppc64le", product_id: "libcurl4-7.60.0-3.14.3.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "curl-7.60.0-3.14.3.s390x", product: { name: "curl-7.60.0-3.14.3.s390x", product_id: "curl-7.60.0-3.14.3.s390x", }, }, { category: "product_version", name: "libcurl-devel-7.60.0-3.14.3.s390x", product: { name: "libcurl-devel-7.60.0-3.14.3.s390x", product_id: "libcurl-devel-7.60.0-3.14.3.s390x", }, }, { category: "product_version", name: "libcurl4-7.60.0-3.14.3.s390x", product: { name: "libcurl4-7.60.0-3.14.3.s390x", product_id: "libcurl4-7.60.0-3.14.3.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "curl-7.60.0-3.14.3.x86_64", product: { name: "curl-7.60.0-3.14.3.x86_64", product_id: "curl-7.60.0-3.14.3.x86_64", }, }, { category: "product_version", name: "libcurl-devel-7.60.0-3.14.3.x86_64", product: { name: "libcurl-devel-7.60.0-3.14.3.x86_64", product_id: "libcurl-devel-7.60.0-3.14.3.x86_64", }, }, { category: "product_version", name: "libcurl4-7.60.0-3.14.3.x86_64", product: { name: "libcurl4-7.60.0-3.14.3.x86_64", product_id: "libcurl4-7.60.0-3.14.3.x86_64", }, }, { category: "product_version", name: "libcurl4-32bit-7.60.0-3.14.3.x86_64", product: { name: "libcurl4-32bit-7.60.0-3.14.3.x86_64", product_id: "libcurl4-32bit-7.60.0-3.14.3.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15", product: { name: "SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "curl-7.60.0-3.14.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.aarch64", }, product_reference: "curl-7.60.0-3.14.3.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "curl-7.60.0-3.14.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.ppc64le", }, product_reference: "curl-7.60.0-3.14.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "curl-7.60.0-3.14.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.s390x", }, product_reference: "curl-7.60.0-3.14.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "curl-7.60.0-3.14.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.x86_64", }, product_reference: "curl-7.60.0-3.14.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.60.0-3.14.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.aarch64", }, product_reference: "libcurl-devel-7.60.0-3.14.3.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.60.0-3.14.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.ppc64le", }, product_reference: "libcurl-devel-7.60.0-3.14.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.60.0-3.14.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.s390x", }, product_reference: "libcurl-devel-7.60.0-3.14.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.60.0-3.14.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.x86_64", }, product_reference: "libcurl-devel-7.60.0-3.14.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.60.0-3.14.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.aarch64", }, product_reference: "libcurl4-7.60.0-3.14.3.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.60.0-3.14.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.ppc64le", }, product_reference: "libcurl4-7.60.0-3.14.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.60.0-3.14.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.s390x", }, product_reference: "libcurl4-7.60.0-3.14.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.60.0-3.14.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.x86_64", }, product_reference: "libcurl4-7.60.0-3.14.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.60.0-3.14.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-32bit-7.60.0-3.14.3.x86_64", }, product_reference: "libcurl4-32bit-7.60.0-3.14.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, ], }, vulnerabilities: [ { cve: "CVE-2018-16839", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16839", }, ], notes: [ { category: "general", text: "Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-32bit-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16839", url: "https://www.suse.com/security/cve/CVE-2018-16839", }, { category: "external", summary: "SUSE Bug 1112758 for CVE-2018-16839", url: "https://bugzilla.suse.com/1112758", }, { category: "external", summary: "SUSE Bug 1113029 for CVE-2018-16839", url: "https://bugzilla.suse.com/1113029", }, { category: "external", summary: "SUSE Bug 1131886 for CVE-2018-16839", url: "https://bugzilla.suse.com/1131886", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-32bit-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-32bit-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-05T16:55:38Z", details: "moderate", }, ], title: "CVE-2018-16839", }, { cve: "CVE-2018-16840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16840", }, ], notes: [ { category: "general", text: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-32bit-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16840", url: "https://www.suse.com/security/cve/CVE-2018-16840", }, { category: "external", summary: "SUSE Bug 1112758 for CVE-2018-16840", url: "https://bugzilla.suse.com/1112758", }, { category: "external", summary: "SUSE Bug 1113029 for CVE-2018-16840", url: "https://bugzilla.suse.com/1113029", }, { category: "external", summary: "SUSE Bug 1122464 for CVE-2018-16840", url: "https://bugzilla.suse.com/1122464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-32bit-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-32bit-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-05T16:55:38Z", details: "moderate", }, ], title: "CVE-2018-16840", }, { cve: "CVE-2018-16842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16842", }, ], notes: [ { category: "general", text: "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-32bit-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16842", url: "https://www.suse.com/security/cve/CVE-2018-16842", }, { category: "external", summary: "SUSE Bug 1113660 for CVE-2018-16842", url: "https://bugzilla.suse.com/1113660", }, { category: "external", summary: "SUSE Bug 1122464 for CVE-2018-16842", url: "https://bugzilla.suse.com/1122464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-32bit-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:curl-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl-devel-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-32bit-7.60.0-3.14.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libcurl4-7.60.0-3.14.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-05T16:55:38Z", details: "moderate", }, ], title: "CVE-2018-16842", }, ], }
opensuse-su-2024:10582-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
curl-7.79.1-1.1 on GA media
Notes
Title of the patch
curl-7.79.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the curl-7.79.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10582
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "curl-7.79.1-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the curl-7.79.1-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10582", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10582-1.json", }, { category: "self", summary: "SUSE CVE CVE-2006-1061 page", url: "https://www.suse.com/security/cve/CVE-2006-1061/", }, { category: "self", summary: "SUSE CVE CVE-2016-9586 page", url: "https://www.suse.com/security/cve/CVE-2016-9586/", }, { category: "self", summary: "SUSE CVE CVE-2016-9594 page", url: "https://www.suse.com/security/cve/CVE-2016-9594/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000099 page", url: "https://www.suse.com/security/cve/CVE-2017-1000099/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000100 page", url: "https://www.suse.com/security/cve/CVE-2017-1000100/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000101 page", url: "https://www.suse.com/security/cve/CVE-2017-1000101/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000254 page", url: "https://www.suse.com/security/cve/CVE-2017-1000254/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000257 page", url: "https://www.suse.com/security/cve/CVE-2017-1000257/", }, { category: "self", summary: "SUSE CVE CVE-2017-2629 page", url: "https://www.suse.com/security/cve/CVE-2017-2629/", }, { category: "self", summary: "SUSE CVE CVE-2017-7468 page", url: "https://www.suse.com/security/cve/CVE-2017-7468/", }, { category: "self", summary: "SUSE CVE CVE-2017-8816 page", url: "https://www.suse.com/security/cve/CVE-2017-8816/", }, { category: "self", summary: "SUSE CVE CVE-2017-8817 page", url: "https://www.suse.com/security/cve/CVE-2017-8817/", }, { category: "self", summary: "SUSE CVE CVE-2017-8818 page", url: "https://www.suse.com/security/cve/CVE-2017-8818/", }, { category: "self", summary: "SUSE CVE CVE-2017-9502 page", url: "https://www.suse.com/security/cve/CVE-2017-9502/", }, { category: "self", summary: "SUSE CVE CVE-2018-0500 page", url: "https://www.suse.com/security/cve/CVE-2018-0500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000005 page", url: "https://www.suse.com/security/cve/CVE-2018-1000005/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000120 page", url: "https://www.suse.com/security/cve/CVE-2018-1000120/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000122 page", url: "https://www.suse.com/security/cve/CVE-2018-1000122/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000300 page", url: "https://www.suse.com/security/cve/CVE-2018-1000300/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000301 page", url: "https://www.suse.com/security/cve/CVE-2018-1000301/", }, { category: "self", summary: "SUSE CVE CVE-2018-14618 page", url: "https://www.suse.com/security/cve/CVE-2018-14618/", }, { category: "self", summary: "SUSE CVE CVE-2018-16839 page", url: "https://www.suse.com/security/cve/CVE-2018-16839/", }, { category: "self", summary: "SUSE CVE CVE-2018-16840 page", url: "https://www.suse.com/security/cve/CVE-2018-16840/", }, { category: "self", summary: "SUSE CVE CVE-2018-16842 page", url: "https://www.suse.com/security/cve/CVE-2018-16842/", }, { category: "self", summary: "SUSE CVE CVE-2018-16890 page", url: "https://www.suse.com/security/cve/CVE-2018-16890/", }, { category: "self", summary: "SUSE CVE CVE-2019-15601 page", url: "https://www.suse.com/security/cve/CVE-2019-15601/", }, { category: "self", summary: "SUSE CVE CVE-2019-3822 page", url: "https://www.suse.com/security/cve/CVE-2019-3822/", }, { category: "self", summary: "SUSE CVE CVE-2019-3823 page", url: "https://www.suse.com/security/cve/CVE-2019-3823/", }, { category: "self", summary: "SUSE CVE CVE-2019-5435 page", url: "https://www.suse.com/security/cve/CVE-2019-5435/", }, { category: "self", summary: "SUSE CVE CVE-2019-5436 page", url: "https://www.suse.com/security/cve/CVE-2019-5436/", }, { category: "self", summary: "SUSE CVE CVE-2019-5481 page", url: "https://www.suse.com/security/cve/CVE-2019-5481/", }, { category: "self", summary: "SUSE CVE CVE-2019-5482 page", url: "https://www.suse.com/security/cve/CVE-2019-5482/", }, { category: "self", summary: "SUSE CVE CVE-2020-8169 page", url: "https://www.suse.com/security/cve/CVE-2020-8169/", }, { category: "self", summary: "SUSE CVE CVE-2020-8231 page", url: "https://www.suse.com/security/cve/CVE-2020-8231/", }, { category: "self", summary: "SUSE CVE CVE-2020-8284 page", url: "https://www.suse.com/security/cve/CVE-2020-8284/", }, { category: "self", summary: "SUSE CVE CVE-2020-8285 page", url: "https://www.suse.com/security/cve/CVE-2020-8285/", }, { category: "self", summary: "SUSE CVE CVE-2020-8286 page", url: "https://www.suse.com/security/cve/CVE-2020-8286/", }, { category: "self", summary: "SUSE CVE CVE-2021-22297 page", url: "https://www.suse.com/security/cve/CVE-2021-22297/", }, { category: "self", summary: "SUSE CVE CVE-2021-22298 page", url: "https://www.suse.com/security/cve/CVE-2021-22298/", }, { category: "self", summary: "SUSE CVE CVE-2021-22876 page", url: "https://www.suse.com/security/cve/CVE-2021-22876/", }, { category: "self", summary: "SUSE CVE CVE-2021-22890 page", url: "https://www.suse.com/security/cve/CVE-2021-22890/", }, { category: "self", summary: "SUSE CVE CVE-2021-22898 page", url: "https://www.suse.com/security/cve/CVE-2021-22898/", }, { category: "self", summary: "SUSE CVE CVE-2021-22901 page", url: "https://www.suse.com/security/cve/CVE-2021-22901/", }, { category: "self", summary: "SUSE CVE CVE-2021-22922 page", url: "https://www.suse.com/security/cve/CVE-2021-22922/", }, { category: "self", summary: "SUSE CVE CVE-2021-22924 page", url: "https://www.suse.com/security/cve/CVE-2021-22924/", }, { category: "self", summary: "SUSE CVE CVE-2021-22945 page", url: "https://www.suse.com/security/cve/CVE-2021-22945/", }, { category: "self", summary: "SUSE CVE CVE-2021-22946 page", url: "https://www.suse.com/security/cve/CVE-2021-22946/", }, { category: "self", summary: "SUSE CVE CVE-2021-22947 page", url: "https://www.suse.com/security/cve/CVE-2021-22947/", }, ], title: "curl-7.79.1-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10582-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "curl-7.79.1-1.1.aarch64", product: { name: "curl-7.79.1-1.1.aarch64", product_id: "curl-7.79.1-1.1.aarch64", }, }, { category: "product_version", name: "libcurl-devel-7.79.1-1.1.aarch64", product: { name: "libcurl-devel-7.79.1-1.1.aarch64", product_id: "libcurl-devel-7.79.1-1.1.aarch64", }, }, { category: "product_version", name: "libcurl-devel-32bit-7.79.1-1.1.aarch64", product: { name: "libcurl-devel-32bit-7.79.1-1.1.aarch64", product_id: "libcurl-devel-32bit-7.79.1-1.1.aarch64", }, }, { category: "product_version", name: "libcurl4-7.79.1-1.1.aarch64", product: { name: "libcurl4-7.79.1-1.1.aarch64", product_id: "libcurl4-7.79.1-1.1.aarch64", }, }, { category: "product_version", name: "libcurl4-32bit-7.79.1-1.1.aarch64", product: { name: "libcurl4-32bit-7.79.1-1.1.aarch64", product_id: "libcurl4-32bit-7.79.1-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "curl-7.79.1-1.1.ppc64le", product: { name: "curl-7.79.1-1.1.ppc64le", product_id: "curl-7.79.1-1.1.ppc64le", }, }, { category: "product_version", name: "libcurl-devel-7.79.1-1.1.ppc64le", product: { name: "libcurl-devel-7.79.1-1.1.ppc64le", product_id: "libcurl-devel-7.79.1-1.1.ppc64le", }, }, { category: "product_version", name: "libcurl-devel-32bit-7.79.1-1.1.ppc64le", product: { name: "libcurl-devel-32bit-7.79.1-1.1.ppc64le", product_id: "libcurl-devel-32bit-7.79.1-1.1.ppc64le", }, }, { category: "product_version", name: "libcurl4-7.79.1-1.1.ppc64le", product: { name: "libcurl4-7.79.1-1.1.ppc64le", product_id: "libcurl4-7.79.1-1.1.ppc64le", }, }, { category: "product_version", name: "libcurl4-32bit-7.79.1-1.1.ppc64le", product: { name: "libcurl4-32bit-7.79.1-1.1.ppc64le", product_id: "libcurl4-32bit-7.79.1-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "curl-7.79.1-1.1.s390x", product: { name: "curl-7.79.1-1.1.s390x", product_id: "curl-7.79.1-1.1.s390x", }, }, { category: "product_version", name: "libcurl-devel-7.79.1-1.1.s390x", product: { name: "libcurl-devel-7.79.1-1.1.s390x", product_id: "libcurl-devel-7.79.1-1.1.s390x", }, }, { category: "product_version", name: "libcurl-devel-32bit-7.79.1-1.1.s390x", product: { name: "libcurl-devel-32bit-7.79.1-1.1.s390x", product_id: "libcurl-devel-32bit-7.79.1-1.1.s390x", }, }, { category: "product_version", name: "libcurl4-7.79.1-1.1.s390x", product: { name: "libcurl4-7.79.1-1.1.s390x", product_id: "libcurl4-7.79.1-1.1.s390x", }, }, { category: "product_version", name: "libcurl4-32bit-7.79.1-1.1.s390x", product: { name: "libcurl4-32bit-7.79.1-1.1.s390x", product_id: "libcurl4-32bit-7.79.1-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "curl-7.79.1-1.1.x86_64", product: { name: "curl-7.79.1-1.1.x86_64", product_id: "curl-7.79.1-1.1.x86_64", }, }, { category: "product_version", name: "libcurl-devel-7.79.1-1.1.x86_64", product: { name: "libcurl-devel-7.79.1-1.1.x86_64", product_id: "libcurl-devel-7.79.1-1.1.x86_64", }, }, { category: "product_version", name: "libcurl-devel-32bit-7.79.1-1.1.x86_64", product: { name: "libcurl-devel-32bit-7.79.1-1.1.x86_64", product_id: "libcurl-devel-32bit-7.79.1-1.1.x86_64", }, }, { category: "product_version", name: "libcurl4-7.79.1-1.1.x86_64", product: { name: "libcurl4-7.79.1-1.1.x86_64", product_id: "libcurl4-7.79.1-1.1.x86_64", }, }, { category: "product_version", name: "libcurl4-32bit-7.79.1-1.1.x86_64", product: { name: "libcurl4-32bit-7.79.1-1.1.x86_64", product_id: "libcurl4-32bit-7.79.1-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "curl-7.79.1-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", }, product_reference: "curl-7.79.1-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "curl-7.79.1-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", }, product_reference: "curl-7.79.1-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "curl-7.79.1-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", }, product_reference: "curl-7.79.1-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "curl-7.79.1-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", }, product_reference: "curl-7.79.1-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.79.1-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", }, product_reference: "libcurl-devel-7.79.1-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.79.1-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", }, product_reference: "libcurl-devel-7.79.1-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.79.1-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", }, product_reference: "libcurl-devel-7.79.1-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-7.79.1-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", }, product_reference: "libcurl-devel-7.79.1-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-32bit-7.79.1-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", }, product_reference: "libcurl-devel-32bit-7.79.1-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-32bit-7.79.1-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", }, product_reference: "libcurl-devel-32bit-7.79.1-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-32bit-7.79.1-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", }, product_reference: "libcurl-devel-32bit-7.79.1-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl-devel-32bit-7.79.1-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", }, product_reference: "libcurl-devel-32bit-7.79.1-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.79.1-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", }, product_reference: "libcurl4-7.79.1-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.79.1-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", }, product_reference: "libcurl4-7.79.1-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.79.1-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", }, product_reference: "libcurl4-7.79.1-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl4-7.79.1-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", }, product_reference: "libcurl4-7.79.1-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.79.1-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", }, product_reference: "libcurl4-32bit-7.79.1-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.79.1-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", }, product_reference: "libcurl4-32bit-7.79.1-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.79.1-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", }, product_reference: "libcurl4-32bit-7.79.1-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libcurl4-32bit-7.79.1-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", }, product_reference: "libcurl4-32bit-7.79.1-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2006-1061", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-1061", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in cURL and libcURL 7.15.0 through 7.15.2 allows remote attackers to execute arbitrary commands via a TFTP URL (tftp://) with a valid hostname and a long path.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-1061", url: "https://www.suse.com/security/cve/CVE-2006-1061", }, { category: "external", summary: "SUSE Bug 157874 for CVE-2006-1061", url: "https://bugzilla.suse.com/157874", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2006-1061", }, { cve: "CVE-2016-9586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9586", }, ], notes: [ { category: "general", text: "curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9586", url: "https://www.suse.com/security/cve/CVE-2016-9586", }, { category: "external", summary: "SUSE Bug 1015332 for CVE-2016-9586", url: "https://bugzilla.suse.com/1015332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-9586", }, { cve: "CVE-2016-9594", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9594", }, ], notes: [ { category: "general", text: "curl before version 7.52.1 is vulnerable to an uninitialized random in libcurl's internal function that returns a good 32bit random value. Having a weak or virtually non-existent random value makes the operations that use it vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9594", url: "https://www.suse.com/security/cve/CVE-2016-9594", }, { category: "external", summary: "SUSE Bug 1016738 for CVE-2016-9594", url: "https://bugzilla.suse.com/1016738", }, { category: "external", summary: "SUSE Bug 1017161 for CVE-2016-9594", url: "https://bugzilla.suse.com/1017161", }, { category: "external", summary: "SUSE Bug 1042181 for CVE-2016-9594", url: "https://bugzilla.suse.com/1042181", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-9594", }, { cve: "CVE-2017-1000099", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000099", }, ], notes: [ { category: "general", text: "When asking to get a file from a file:// URL, libcurl provides a feature that outputs meta-data about the file using HTTP-like headers. The code doing this would send the wrong buffer to the user (stdout or the application's provide callback), which could lead to other private data from the heap to get inadvertently displayed. The wrong buffer was an uninitialized memory area allocated on the heap and if it turned out to not contain any zero byte, it would continue and display the data following that buffer in memory.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000099", url: "https://www.suse.com/security/cve/CVE-2017-1000099", }, { category: "external", summary: "SUSE Bug 1051645 for CVE-2017-1000099", url: "https://bugzilla.suse.com/1051645", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2017-1000099", url: "https://bugzilla.suse.com/1053919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-1000099", }, { cve: "CVE-2017-1000100", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000100", }, ], notes: [ { category: "general", text: "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000100", url: "https://www.suse.com/security/cve/CVE-2017-1000100", }, { category: "external", summary: "SUSE Bug 1051644 for CVE-2017-1000100", url: "https://bugzilla.suse.com/1051644", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-1000100", }, { cve: "CVE-2017-1000101", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000101", }, ], notes: [ { category: "general", text: "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000101", url: "https://www.suse.com/security/cve/CVE-2017-1000101", }, { category: "external", summary: "SUSE Bug 1051643 for CVE-2017-1000101", url: "https://bugzilla.suse.com/1051643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-1000101", }, { cve: "CVE-2017-1000254", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000254", }, ], notes: [ { category: "general", text: "libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000254", url: "https://www.suse.com/security/cve/CVE-2017-1000254", }, { category: "external", summary: "SUSE Bug 1061876 for CVE-2017-1000254", url: "https://bugzilla.suse.com/1061876", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-1000254", }, { cve: "CVE-2017-1000257", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000257", }, ], notes: [ { category: "general", text: "An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000257", url: "https://www.suse.com/security/cve/CVE-2017-1000257", }, { category: "external", summary: "SUSE Bug 1063824 for CVE-2017-1000257", url: "https://bugzilla.suse.com/1063824", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-1000257", }, { cve: "CVE-2017-2629", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2629", }, ], notes: [ { category: "general", text: "curl before 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server's certificate's validity in the code that checks for a test success or failure. It ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question. This could lead to users not detecting when a server's certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. This flaw also exists in the command line tool (--cert-status).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2629", url: "https://www.suse.com/security/cve/CVE-2017-2629", }, { category: "external", summary: "SUSE Bug 1025379 for CVE-2017-2629", url: "https://bugzilla.suse.com/1025379", }, { category: "external", summary: "SUSE Bug 1042181 for CVE-2017-2629", url: "https://bugzilla.suse.com/1042181", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-2629", }, { cve: "CVE-2017-7468", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7468", }, ], notes: [ { category: "general", text: "In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn't be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7468", url: "https://www.suse.com/security/cve/CVE-2017-7468", }, { category: "external", summary: "SUSE Bug 1033413 for CVE-2017-7468", url: "https://bugzilla.suse.com/1033413", }, { category: "external", summary: "SUSE Bug 1033442 for CVE-2017-7468", url: "https://bugzilla.suse.com/1033442", }, { category: "external", summary: "SUSE Bug 1042181 for CVE-2017-7468", url: "https://bugzilla.suse.com/1042181", }, { category: "external", summary: "SUSE Bug 991389 for CVE-2017-7468", url: "https://bugzilla.suse.com/991389", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-7468", }, { cve: "CVE-2017-8816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8816", }, ], notes: [ { category: "general", text: "The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8816", url: "https://www.suse.com/security/cve/CVE-2017-8816", }, { category: "external", summary: "SUSE Bug 1069226 for CVE-2017-8816", url: "https://bugzilla.suse.com/1069226", }, { category: "external", summary: "SUSE Bug 1106019 for CVE-2017-8816", url: "https://bugzilla.suse.com/1106019", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-8816", }, { cve: "CVE-2017-8817", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8817", }, ], notes: [ { category: "general", text: "The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8817", url: "https://www.suse.com/security/cve/CVE-2017-8817", }, { category: "external", summary: "SUSE Bug 1069222 for CVE-2017-8817", url: "https://bugzilla.suse.com/1069222", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-8817", }, { cve: "CVE-2017-8818", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8818", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL library.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8818", url: "https://www.suse.com/security/cve/CVE-2017-8818", }, { category: "external", summary: "SUSE Bug 1069714 for CVE-2017-8818", url: "https://bugzilla.suse.com/1069714", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2017-8818", }, { cve: "CVE-2017-9502", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9502", }, ], notes: [ { category: "general", text: "In curl before 7.54.1 on Windows and DOS, libcurl's default protocol function, which is the logic that allows an application to set which protocol libcurl should attempt to use when given a URL without a scheme part, had a flaw that could lead to it overwriting a heap based memory buffer with seven bytes. If the default protocol is specified to be FILE or a file: URL lacks two slashes, the given \"URL\" starts with a drive letter, and libcurl is built for Windows or DOS, then libcurl would copy the path 7 bytes off, so that the end of the given path would write beyond the malloc buffer (7 bytes being the length in bytes of the ascii string \"file://\").", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9502", url: "https://www.suse.com/security/cve/CVE-2017-9502", }, { category: "external", summary: "SUSE Bug 1044243 for CVE-2017-9502", url: "https://bugzilla.suse.com/1044243", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-9502", }, { cve: "CVE-2018-0500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-0500", }, ], notes: [ { category: "general", text: "Curl_smtp_escape_eob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nonstandard --limit-rate argument or CURLOPT_BUFFERSIZE value).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-0500", url: "https://www.suse.com/security/cve/CVE-2018-0500", }, { category: "external", summary: "SUSE Bug 1099793 for CVE-2018-0500", url: "https://bugzilla.suse.com/1099793", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-0500", }, { cve: "CVE-2018-1000005", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000005", }, ], notes: [ { category: "general", text: "libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000005", url: "https://www.suse.com/security/cve/CVE-2018-1000005", }, { category: "external", summary: "SUSE Bug 1076360 for CVE-2018-1000005", url: "https://bugzilla.suse.com/1076360", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-1000005", }, { cve: "CVE-2018-1000120", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000120", }, ], notes: [ { category: "general", text: "A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000120", url: "https://www.suse.com/security/cve/CVE-2018-1000120", }, { category: "external", summary: "SUSE Bug 1084521 for CVE-2018-1000120", url: "https://bugzilla.suse.com/1084521", }, { category: "external", summary: "SUSE Bug 1101811 for CVE-2018-1000120", url: "https://bugzilla.suse.com/1101811", }, { category: "external", summary: "SUSE Bug 1112526 for CVE-2018-1000120", url: "https://bugzilla.suse.com/1112526", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1000120", }, { cve: "CVE-2018-1000122", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000122", }, ], notes: [ { category: "general", text: "A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000122", url: "https://www.suse.com/security/cve/CVE-2018-1000122", }, { category: "external", summary: "SUSE Bug 1084532 for CVE-2018-1000122", url: "https://bugzilla.suse.com/1084532", }, { category: "external", summary: "SUSE Bug 1101811 for CVE-2018-1000122", url: "https://bugzilla.suse.com/1101811", }, { category: "external", summary: "SUSE Bug 1112526 for CVE-2018-1000122", url: "https://bugzilla.suse.com/1112526", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1000122", }, { cve: "CVE-2018-1000300", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000300", }, ], notes: [ { category: "general", text: "curl version curl 7.54.1 to and including curl 7.59.0 contains a CWE-122: Heap-based Buffer Overflow vulnerability in denial of service and more that can result in curl might overflow a heap based memory buffer when closing down an FTP connection with very long server command replies.. This vulnerability appears to have been fixed in curl < 7.54.1 and curl >= 7.60.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000300", url: "https://www.suse.com/security/cve/CVE-2018-1000300", }, { category: "external", summary: "SUSE Bug 1092094 for CVE-2018-1000300", url: "https://bugzilla.suse.com/1092094", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-1000300", }, { cve: "CVE-2018-1000301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000301", }, ], notes: [ { category: "general", text: "curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000301", url: "https://www.suse.com/security/cve/CVE-2018-1000301", }, { category: "external", summary: "SUSE Bug 1092098 for CVE-2018-1000301", url: "https://bugzilla.suse.com/1092098", }, { category: "external", summary: "SUSE Bug 1122464 for CVE-2018-1000301", url: "https://bugzilla.suse.com/1122464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-1000301", }, { cve: "CVE-2018-14618", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14618", }, ], notes: [ { category: "general", text: "curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14618", url: "https://www.suse.com/security/cve/CVE-2018-14618", }, { category: "external", summary: "SUSE Bug 1106019 for CVE-2018-14618", url: "https://bugzilla.suse.com/1106019", }, { category: "external", summary: "SUSE Bug 1112758 for CVE-2018-14618", url: "https://bugzilla.suse.com/1112758", }, { category: "external", summary: "SUSE Bug 1122464 for CVE-2018-14618", url: "https://bugzilla.suse.com/1122464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14618", }, { cve: "CVE-2018-16839", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16839", }, ], notes: [ { category: "general", text: "Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16839", url: "https://www.suse.com/security/cve/CVE-2018-16839", }, { category: "external", summary: "SUSE Bug 1112758 for CVE-2018-16839", url: "https://bugzilla.suse.com/1112758", }, { category: "external", summary: "SUSE Bug 1113029 for CVE-2018-16839", url: "https://bugzilla.suse.com/1113029", }, { category: "external", summary: "SUSE Bug 1131886 for CVE-2018-16839", url: "https://bugzilla.suse.com/1131886", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-16839", }, { cve: "CVE-2018-16840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16840", }, ], notes: [ { category: "general", text: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16840", url: "https://www.suse.com/security/cve/CVE-2018-16840", }, { category: "external", summary: "SUSE Bug 1112758 for CVE-2018-16840", url: "https://bugzilla.suse.com/1112758", }, { category: "external", summary: "SUSE Bug 1113029 for CVE-2018-16840", url: "https://bugzilla.suse.com/1113029", }, { category: "external", summary: "SUSE Bug 1122464 for CVE-2018-16840", url: "https://bugzilla.suse.com/1122464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-16840", }, { cve: "CVE-2018-16842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16842", }, ], notes: [ { category: "general", text: "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16842", url: "https://www.suse.com/security/cve/CVE-2018-16842", }, { category: "external", summary: "SUSE Bug 1113660 for CVE-2018-16842", url: "https://bugzilla.suse.com/1113660", }, { category: "external", summary: "SUSE Bug 1122464 for CVE-2018-16842", url: "https://bugzilla.suse.com/1122464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-16842", }, { cve: "CVE-2018-16890", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16890", }, ], notes: [ { category: "general", text: "libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16890", url: "https://www.suse.com/security/cve/CVE-2018-16890", }, { category: "external", summary: "SUSE Bug 1123371 for CVE-2018-16890", url: "https://bugzilla.suse.com/1123371", }, { category: "external", summary: "SUSE Bug 1123378 for CVE-2018-16890", url: "https://bugzilla.suse.com/1123378", }, { category: "external", summary: "SUSE Bug 1141798 for CVE-2018-16890", url: "https://bugzilla.suse.com/1141798", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-16890", }, { cve: "CVE-2019-15601", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15601", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15601", url: "https://www.suse.com/security/cve/CVE-2019-15601", }, { category: "external", summary: "SUSE Bug 1160301 for CVE-2019-15601", url: "https://bugzilla.suse.com/1160301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-15601", }, { cve: "CVE-2019-3822", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3822", }, ], notes: [ { category: "general", text: "libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large 'nt response' data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a 'large value' needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3822", url: "https://www.suse.com/security/cve/CVE-2019-3822", }, { category: "external", summary: "SUSE Bug 1123377 for CVE-2019-3822", url: "https://bugzilla.suse.com/1123377", }, { category: "external", summary: "SUSE Bug 1141798 for CVE-2019-3822", url: "https://bugzilla.suse.com/1141798", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-3822", }, { cve: "CVE-2019-3823", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3823", }, ], notes: [ { category: "general", text: "libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3823", url: "https://www.suse.com/security/cve/CVE-2019-3823", }, { category: "external", summary: "SUSE Bug 1123378 for CVE-2019-3823", url: "https://bugzilla.suse.com/1123378", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2019-3823", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1141798 for CVE-2019-3823", url: "https://bugzilla.suse.com/1141798", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-3823", }, { cve: "CVE-2019-5435", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5435", }, ], notes: [ { category: "general", text: "An integer overflow in curl's URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5435", url: "https://www.suse.com/security/cve/CVE-2019-5435", }, { category: "external", summary: "SUSE Bug 1135176 for CVE-2019-5435", url: "https://bugzilla.suse.com/1135176", }, { category: "external", summary: "SUSE Bug 1154162 for CVE-2019-5435", url: "https://bugzilla.suse.com/1154162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-5435", }, { cve: "CVE-2019-5436", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5436", }, ], notes: [ { category: "general", text: "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5436", url: "https://www.suse.com/security/cve/CVE-2019-5436", }, { category: "external", summary: "SUSE Bug 1135170 for CVE-2019-5436", url: "https://bugzilla.suse.com/1135170", }, { category: "external", summary: "SUSE Bug 1149496 for CVE-2019-5436", url: "https://bugzilla.suse.com/1149496", }, { category: "external", summary: "SUSE Bug 1154162 for CVE-2019-5436", url: "https://bugzilla.suse.com/1154162", }, { category: "external", summary: "SUSE Bug 1167096 for CVE-2019-5436", url: "https://bugzilla.suse.com/1167096", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-5436", }, { cve: "CVE-2019-5481", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5481", }, ], notes: [ { category: "general", text: "Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5481", url: "https://www.suse.com/security/cve/CVE-2019-5481", }, { category: "external", summary: "SUSE Bug 1149495 for CVE-2019-5481", url: "https://bugzilla.suse.com/1149495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-5481", }, { cve: "CVE-2019-5482", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5482", }, ], notes: [ { category: "general", text: "Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5482", url: "https://www.suse.com/security/cve/CVE-2019-5482", }, { category: "external", summary: "SUSE Bug 1149496 for CVE-2019-5482", url: "https://bugzilla.suse.com/1149496", }, { category: "external", summary: "SUSE Bug 1156634 for CVE-2019-5482", url: "https://bugzilla.suse.com/1156634", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-5482", }, { cve: "CVE-2020-8169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8169", }, ], notes: [ { category: "general", text: "curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8169", url: "https://www.suse.com/security/cve/CVE-2020-8169", }, { category: "external", summary: "SUSE Bug 1173026 for CVE-2020-8169", url: "https://bugzilla.suse.com/1173026", }, { category: "external", summary: "SUSE Bug 1186108 for CVE-2020-8169", url: "https://bugzilla.suse.com/1186108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8169", }, { cve: "CVE-2020-8231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8231", }, ], notes: [ { category: "general", text: "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8231", url: "https://www.suse.com/security/cve/CVE-2020-8231", }, { category: "external", summary: "SUSE Bug 1175109 for CVE-2020-8231", url: "https://bugzilla.suse.com/1175109", }, { category: "external", summary: "SUSE Bug 1179399 for CVE-2020-8231", url: "https://bugzilla.suse.com/1179399", }, { category: "external", summary: "SUSE Bug 1186108 for CVE-2020-8231", url: "https://bugzilla.suse.com/1186108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2020-8231", }, { cve: "CVE-2020-8284", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8284", }, ], notes: [ { category: "general", text: "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8284", url: "https://www.suse.com/security/cve/CVE-2020-8284", }, { category: "external", summary: "SUSE Bug 1179398 for CVE-2020-8284", url: "https://bugzilla.suse.com/1179398", }, { category: "external", summary: "SUSE Bug 1179399 for CVE-2020-8284", url: "https://bugzilla.suse.com/1179399", }, { category: "external", summary: "SUSE Bug 1186108 for CVE-2020-8284", url: "https://bugzilla.suse.com/1186108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8284", }, { cve: "CVE-2020-8285", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8285", }, ], notes: [ { category: "general", text: "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8285", url: "https://www.suse.com/security/cve/CVE-2020-8285", }, { category: "external", summary: "SUSE Bug 1179399 for CVE-2020-8285", url: "https://bugzilla.suse.com/1179399", }, { category: "external", summary: "SUSE Bug 1186108 for CVE-2020-8285", url: "https://bugzilla.suse.com/1186108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8285", }, { cve: "CVE-2020-8286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8286", }, ], notes: [ { category: "general", text: "curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8286", url: "https://www.suse.com/security/cve/CVE-2020-8286", }, { category: "external", summary: "SUSE Bug 1179593 for CVE-2020-8286", url: "https://bugzilla.suse.com/1179593", }, { category: "external", summary: "SUSE Bug 1186108 for CVE-2020-8286", url: "https://bugzilla.suse.com/1186108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8286", }, { cve: "CVE-2021-22297", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22297", }, ], notes: [ { category: "general", text: "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22297", url: "https://www.suse.com/security/cve/CVE-2021-22297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-22297", }, { cve: "CVE-2021-22298", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22298", }, ], notes: [ { category: "general", text: "There is a logic vulnerability in Huawei Gauss100 OLTP Product. An attacker with certain permissions could perform specific SQL statement to exploit this vulnerability. Due to insufficient security design, successful exploit can cause service abnormal. Affected product versions include: ManageOne versions 6.5.1.1.B020, 6.5.1.1.B030, 6.5.1.1.B040, 6.5.1.SPC100.B050, 6.5.1.SPC101.B010, 6.5.1.SPC101.B040, 6.5.1.SPC200, 6.5.1.SPC200.B010, 6.5.1.SPC200.B030, 6.5.1.SPC200.B040, 6.5.1.SPC200.B050, 6.5.1.SPC200.B060, 6.5.1.SPC200.B070, 6.5.1RC1.B070, 6.5.1RC1.B080, 6.5.1RC2.B040, 6.5.1RC2.B050, 6.5.1RC2.B060, 6.5.1RC2.B070, 6.5.1RC2.B080, 6.5.1RC2.B090.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22298", url: "https://www.suse.com/security/cve/CVE-2021-22298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-22298", }, { cve: "CVE-2021-22876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22876", }, ], notes: [ { category: "general", text: "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22876", url: "https://www.suse.com/security/cve/CVE-2021-22876", }, { category: "external", summary: "SUSE Bug 1183933 for CVE-2021-22876", url: "https://bugzilla.suse.com/1183933", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-22876", }, { cve: "CVE-2021-22890", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22890", }, ], notes: [ { category: "general", text: "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22890", url: "https://www.suse.com/security/cve/CVE-2021-22890", }, { category: "external", summary: "SUSE Bug 1183934 for CVE-2021-22890", url: "https://bugzilla.suse.com/1183934", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2021-22890", }, { cve: "CVE-2021-22898", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22898", }, ], notes: [ { category: "general", text: "curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22898", url: "https://www.suse.com/security/cve/CVE-2021-22898", }, { category: "external", summary: "SUSE Bug 1186114 for CVE-2021-22898", url: "https://bugzilla.suse.com/1186114", }, { category: "external", summary: "SUSE Bug 1192450 for CVE-2021-22898", url: "https://bugzilla.suse.com/1192450", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-22898", }, { cve: "CVE-2021-22901", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22901", }, ], notes: [ { category: "general", text: "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22901", url: "https://www.suse.com/security/cve/CVE-2021-22901", }, { category: "external", summary: "SUSE Bug 1186115 for CVE-2021-22901", url: "https://bugzilla.suse.com/1186115", }, { category: "external", summary: "SUSE Bug 1188549 for CVE-2021-22901", url: "https://bugzilla.suse.com/1188549", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-22901", }, { cve: "CVE-2021-22922", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22922", }, ], notes: [ { category: "general", text: "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22922", url: "https://www.suse.com/security/cve/CVE-2021-22922", }, { category: "external", summary: "SUSE Bug 1188217 for CVE-2021-22922", url: "https://bugzilla.suse.com/1188217", }, { category: "external", summary: "SUSE Bug 1192447 for CVE-2021-22922", url: "https://bugzilla.suse.com/1192447", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-22922", }, { cve: "CVE-2021-22924", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22924", }, ], notes: [ { category: "general", text: "libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22924", url: "https://www.suse.com/security/cve/CVE-2021-22924", }, { category: "external", summary: "SUSE Bug 1188219 for CVE-2021-22924", url: "https://bugzilla.suse.com/1188219", }, { category: "external", summary: "SUSE Bug 1192447 for CVE-2021-22924", url: "https://bugzilla.suse.com/1192447", }, { category: "external", summary: "SUSE Bug 1200196 for CVE-2021-22924", url: "https://bugzilla.suse.com/1200196", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-22924", }, { cve: "CVE-2021-22945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22945", }, ], notes: [ { category: "general", text: "When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22945", url: "https://www.suse.com/security/cve/CVE-2021-22945", }, { category: "external", summary: "SUSE Bug 1190213 for CVE-2021-22945", url: "https://bugzilla.suse.com/1190213", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-22945", }, { cve: "CVE-2021-22946", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22946", }, ], notes: [ { category: "general", text: "A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22946", url: "https://www.suse.com/security/cve/CVE-2021-22946", }, { category: "external", summary: "SUSE Bug 1190373 for CVE-2021-22946", url: "https://bugzilla.suse.com/1190373", }, { category: "external", summary: "SUSE Bug 1194948 for CVE-2021-22946", url: "https://bugzilla.suse.com/1194948", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-22946", }, { cve: "CVE-2021-22947", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22947", }, ], notes: [ { category: "general", text: "When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22947", url: "https://www.suse.com/security/cve/CVE-2021-22947", }, { category: "external", summary: "SUSE Bug 1190374 for CVE-2021-22947", url: "https://bugzilla.suse.com/1190374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:curl-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:curl-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:curl-7.79.1-1.1.s390x", "openSUSE Tumbleweed:curl-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl-devel-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-32bit-7.79.1-1.1.x86_64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.aarch64", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.ppc64le", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.s390x", "openSUSE Tumbleweed:libcurl4-7.79.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-22947", }, ], }
RHSA-2019:1543
Vulnerability from csaf_redhat
Published
2019-06-18 19:08
Modified
2025-03-17 01:13
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update
Notes
Topic
Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 packages for Microsoft Windows and Oracle Solaris are now available.
Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services
Apache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.
Security Fix(es):
* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)
* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)
* libxml2: NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of service (CVE-2018-14404)
* curl: Out-of-bounds read in code handling HTTP/2 trailers (CVE-2018-1000005)
* curl: HTTP authentication leak in redirects (CVE-2018-1000007)
* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120)
* curl: RTSP RTP buffer over-read (CVE-2018-1000122)
* httpd: privilege escalation from modules scripts (CVE-2019-0211)
Details around these issues, including information about CVEs, severity of the issues, and CVSS scores can be found on the CVE pages listed in the References section below.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 packages for Microsoft Windows and Oracle Solaris are now available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "This release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* libxml2: NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of service (CVE-2018-14404)\n\n* curl: Out-of-bounds read in code handling HTTP/2 trailers (CVE-2018-1000005)\n\n* curl: HTTP authentication leak in redirects (CVE-2018-1000007)\n\n* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120)\n\n* curl: RTSP RTP buffer over-read (CVE-2018-1000122)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around these issues, including information about CVEs, severity of the issues, and CVSS scores can be found on the CVE pages listed in the References section below.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1543", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", }, { category: "external", summary: "1536013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1536013", }, { category: "external", summary: "1537125", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1537125", }, { category: "external", summary: "1552628", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552628", }, { category: "external", summary: "1553398", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1553398", }, { category: "external", summary: "1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "1595985", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1595985", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "JBCS-722", url: "https://issues.redhat.com/browse/JBCS-722", }, { category: "external", summary: "JBCS-750", url: "https://issues.redhat.com/browse/JBCS-750", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1543.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update", tracking: { current_release_date: "2025-03-17T01:13:43+00:00", generator: { date: "2025-03-17T01:13:43+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2019:1543", initial_release_date: "2019-06-18T19:08:49+00:00", revision_history: [ { date: "2019-06-18T19:08:49+00:00", number: "1", summary: "Initial version", }, { date: "2019-06-18T19:08:49+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-17T01:13:43+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product: { name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_id: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1", }, }, }, ], category: "product_family", name: "Red Hat JBoss Core Services", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0495", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591163", }, ], notes: [ { category: "description", text: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", title: "Vulnerability description", }, { category: "summary", text: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", title: "Vulnerability summary", }, { category: "other", text: "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0495", }, { category: "external", summary: "RHBZ#1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0495", url: "https://www.cve.org/CVERecord?id=CVE-2018-0495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", }, { category: "external", summary: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, ], release_date: "2018-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", }, { cve: "CVE-2018-0732", cwe: { id: "CWE-325", name: "Missing Cryptographic Step", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591100", }, ], notes: [ { category: "description", text: "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", title: "Vulnerability description", }, { category: "summary", text: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0732", }, { category: "external", summary: "RHBZ#1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0732", url: "https://www.cve.org/CVERecord?id=CVE-2018-0732", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", }, { category: "external", summary: "https://www.openssl.org/news/secadv/20180612.txt", url: "https://www.openssl.org/news/secadv/20180612.txt", }, ], release_date: "2018-06-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", }, { cve: "CVE-2018-14404", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2018-06-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1595985", }, ], notes: [ { category: "description", text: "A null pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing invalid XPath expression. Applications processing untrusted XSL format inputs with the use of libxml2 library may be vulnerable to denial of service attack due to crash of the application.", title: "Vulnerability description", }, { category: "summary", text: "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14404", }, { category: "external", summary: "RHBZ#1595985", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1595985", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14404", url: "https://www.cve.org/CVERecord?id=CVE-2018-14404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14404", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14404", }, ], release_date: "2018-06-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Harry Sintonen", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16839", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-10-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1642201", }, ], notes: [ { category: "description", text: "Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.", title: "Vulnerability description", }, { category: "summary", text: "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16839", }, { category: "external", summary: "RHBZ#1642201", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1642201", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16839", url: "https://www.cve.org/CVERecord?id=CVE-2018-16839", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16839", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16839", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16839.html", url: "https://curl.haxx.se/docs/CVE-2018-16839.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16840", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2018-10-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1642203", }, ], notes: [ { category: "description", text: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", title: "Vulnerability description", }, { category: "summary", text: "curl: Use-after-free when closing \"easy\" handle in Curl_close()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16840", }, { category: "external", summary: "RHBZ#1642203", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1642203", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16840", url: "https://www.cve.org/CVERecord?id=CVE-2018-16840", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16840", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16840", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16840.html", url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Use-after-free when closing \"easy\" handle in Curl_close()", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16842", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-10-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1644124", }, ], notes: [ { category: "description", text: "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.", title: "Vulnerability description", }, { category: "summary", text: "curl: Heap-based buffer over-read in the curl tool warning formatting", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16842", }, { category: "external", summary: "RHBZ#1644124", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1644124", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16842", url: "https://www.cve.org/CVERecord?id=CVE-2018-16842", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16842", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16842", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16842.html", url: "https://curl.haxx.se/docs/CVE-2018-16842.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 3.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Heap-based buffer over-read in the curl tool warning formatting", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Wenxiang Qian", ], organization: "Tencent Blade Team", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16890", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670252", }, ], notes: [ { category: "description", text: "An out-of-bounds read flaw was found in the way curl handled NTLMv2 type-2 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", title: "Vulnerability description", }, { category: "summary", text: "curl: NTLM type-2 heap out-of-bounds buffer read", title: "Vulnerability summary", }, { category: "other", text: "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-2 headers, hence they are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16890", }, { category: "external", summary: "RHBZ#1670252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670252", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16890", url: "https://www.cve.org/CVERecord?id=CVE-2018-16890", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16890", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16890", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16890.html", url: "https://curl.haxx.se/docs/CVE-2018-16890.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Turn off NTLM authentication.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: NTLM type-2 heap out-of-bounds buffer read", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Zhouyihai Ding", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000005", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-01-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1536013", }, ], notes: [ { category: "description", text: "libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.", title: "Vulnerability description", }, { category: "summary", text: "curl: Out-of-bounds read in code handling HTTP/2 trailers", title: "Vulnerability summary", }, { category: "other", text: "This flaw was introduced in curl-7.49.0. Therefore the versions of curl shipped with Red Hat Enterprise Linux 5, 6 and 7 and Red Hat Ceph Storage 2 are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000005", }, { category: "external", summary: "RHBZ#1536013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1536013", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000005", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000005", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-824a.html", url: "https://curl.haxx.se/docs/adv_2018-824a.html", }, ], release_date: "2018-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Out-of-bounds read in code handling HTTP/2 trailers", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Craig de Stigter", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000007", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-01-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1537125", }, ], notes: [ { category: "description", text: "It was found that curl and libcurl might send their Authentication header to a third party HTTP server upon receiving an HTTP REDIRECT reply. This could leak authentication token to external entities.", title: "Vulnerability description", }, { category: "summary", text: "curl: HTTP authentication leak in redirects", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of curl as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of httpd24-curl as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000007", }, { category: "external", summary: "RHBZ#1537125", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1537125", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000007", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000007", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-b3bf.html", url: "https://curl.haxx.se/docs/adv_2018-b3bf.html", }, ], release_date: "2018-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "By default, curl and libcurl will not follow redirect requests.\nThis flaw happens only when curl or libcurl are explicitly requested to follow redirects (option --location in curl, and CURLOPT_FOLLOWLOCATION in libcurl).\nTo mitigate this, it is possible to prevent the automated following of redirects, replacing it by manual redirects (and remove the authentication header), for example.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: HTTP authentication leak in redirects", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Duy Phan Thanh", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000120", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2018-03-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1552628", }, ], notes: [ { category: "description", text: "It was found that libcurl did not safely parse FTP URLs when using the CURLOPT_FTP_FILEMETHOD method. An attacker, able to provide a specially crafted FTP URL to an application using libcurl, could write a NULL byte at an arbitrary location, resulting in a crash or an unspecified behavior.", title: "Vulnerability description", }, { category: "summary", text: "curl: FTP path trickery leads to NIL byte out of bounds write", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000120", }, { category: "external", summary: "RHBZ#1552628", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552628", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000120", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000120", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-9cd6.html", url: "https://curl.haxx.se/docs/adv_2018-9cd6.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Preventing application from using non-default CURLOPT_FTP_FILEMETHOD will avoid triggering the vulnerable code.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: FTP path trickery leads to NIL byte out of bounds write", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Dario Weisser", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000121", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2018-03-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1552631", }, ], notes: [ { category: "description", text: "A NULL pointer dereference flaw was found in the way libcurl checks values returned by the openldap ldap_get_attribute_ber() function. A malicious LDAP server could use this flaw to crash a libcurl client application via a specially crafted LDAP reply.", title: "Vulnerability description", }, { category: "summary", text: "curl: LDAP NULL pointer dereference", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000121", }, { category: "external", summary: "RHBZ#1552631", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552631", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000121", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000121", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-97a2.html", url: "https://curl.haxx.se/docs/adv_2018-97a2.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: LDAP NULL pointer dereference", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Max Dymond", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000122", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1553398", }, ], notes: [ { category: "description", text: "A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage", title: "Vulnerability description", }, { category: "summary", text: "curl: RTSP RTP buffer over-read", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000122", }, { category: "external", summary: "RHBZ#1553398", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1553398", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000122", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000122", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-b047.html", url: "https://curl.haxx.se/docs/adv_2018-b047.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: RTSP RTP buffer over-read", }, { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Wenxiang Qian", ], organization: "Tencent Blade Team", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-3822", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670254", }, ], notes: [ { category: "description", text: "A stack-based buffer overflow was found in the way curl handled NTLMv2 type-3 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", title: "Vulnerability description", }, { category: "summary", text: "curl: NTLMv2 type-3 header stack buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-3 headers, hence they are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3822", }, { category: "external", summary: "RHBZ#1670254", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670254", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3822", url: "https://www.cve.org/CVERecord?id=CVE-2019-3822", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3822", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3822", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-3822.html", url: "https://curl.haxx.se/docs/CVE-2019-3822.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Turn off NTLM authentication.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: NTLMv2 type-3 header stack buffer overflow", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-3823", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670256", }, ], notes: [ { category: "description", text: "An out-of-bounds read flaw was found in the way curl handled certain SMTP responses. A remote attacker could use this flaw to crash curl.", title: "Vulnerability description", }, { category: "summary", text: "curl: SMTP end-of-response out-of-bounds read", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3823", }, { category: "external", summary: "RHBZ#1670256", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670256", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3823", url: "https://www.cve.org/CVERecord?id=CVE-2019-3823", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3823", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3823", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-3823.html", url: "https://curl.haxx.se/docs/CVE-2019-3823.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Do not use SMTP authentication with curl", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: SMTP end-of-response out-of-bounds read", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "l00p3r", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-5436", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2019-05-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1710620", }, ], notes: [ { category: "description", text: "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.", title: "Vulnerability description", }, { category: "summary", text: "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function", title: "Vulnerability summary", }, { category: "other", text: "This flaw exists if the user selects to use a \"blksize\" of 504 or smaller (default is 512). The smaller size that is used, the larger the possible overflow becomes.\nUsers choosing a smaller size than default should be rare as the primary use case for changing the size is to make it larger. It is rare for users to use TFTP across the Internet. It is most commonly used within local networks.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-5436", }, { category: "external", summary: "RHBZ#1710620", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1710620", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-5436", url: "https://www.cve.org/CVERecord?id=CVE-2019-5436", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-5436", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-5436", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-5436.html", url: "https://curl.haxx.se/docs/CVE-2019-5436.html", }, ], release_date: "2019-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function", }, ], }
rhsa-2019_1543
Vulnerability from csaf_redhat
Published
2019-06-18 19:08
Modified
2024-11-22 13:00
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update
Notes
Topic
Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 packages for Microsoft Windows and Oracle Solaris are now available.
Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services
Apache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.
Security Fix(es):
* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)
* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)
* libxml2: NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of service (CVE-2018-14404)
* curl: Out-of-bounds read in code handling HTTP/2 trailers (CVE-2018-1000005)
* curl: HTTP authentication leak in redirects (CVE-2018-1000007)
* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120)
* curl: RTSP RTP buffer over-read (CVE-2018-1000122)
* httpd: privilege escalation from modules scripts (CVE-2019-0211)
Details around these issues, including information about CVEs, severity of the issues, and CVSS scores can be found on the CVE pages listed in the References section below.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 packages for Microsoft Windows and Oracle Solaris are now available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "This release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* libxml2: NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of service (CVE-2018-14404)\n\n* curl: Out-of-bounds read in code handling HTTP/2 trailers (CVE-2018-1000005)\n\n* curl: HTTP authentication leak in redirects (CVE-2018-1000007)\n\n* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120)\n\n* curl: RTSP RTP buffer over-read (CVE-2018-1000122)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around these issues, including information about CVEs, severity of the issues, and CVSS scores can be found on the CVE pages listed in the References section below.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1543", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", }, { category: "external", summary: "1536013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1536013", }, { category: "external", summary: "1537125", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1537125", }, { category: "external", summary: "1552628", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552628", }, { category: "external", summary: "1553398", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1553398", }, { category: "external", summary: "1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "1595985", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1595985", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "JBCS-722", url: "https://issues.redhat.com/browse/JBCS-722", }, { category: "external", summary: "JBCS-750", url: "https://issues.redhat.com/browse/JBCS-750", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1543.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update", tracking: { current_release_date: "2024-11-22T13:00:03+00:00", generator: { date: "2024-11-22T13:00:03+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:1543", initial_release_date: "2019-06-18T19:08:49+00:00", revision_history: [ { date: "2019-06-18T19:08:49+00:00", number: "1", summary: "Initial version", }, { date: "2019-06-18T19:08:49+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T13:00:03+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product: { name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_id: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1", }, }, }, ], category: "product_family", name: "Red Hat JBoss Core Services", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0495", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591163", }, ], notes: [ { category: "description", text: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", title: "Vulnerability description", }, { category: "summary", text: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", title: "Vulnerability summary", }, { category: "other", text: "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0495", }, { category: "external", summary: "RHBZ#1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0495", url: "https://www.cve.org/CVERecord?id=CVE-2018-0495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", }, { category: "external", summary: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, ], release_date: "2018-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", }, { cve: "CVE-2018-0732", cwe: { id: "CWE-325", name: "Missing Cryptographic Step", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591100", }, ], notes: [ { category: "description", text: "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", title: "Vulnerability description", }, { category: "summary", text: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0732", }, { category: "external", summary: "RHBZ#1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0732", url: "https://www.cve.org/CVERecord?id=CVE-2018-0732", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", }, { category: "external", summary: "https://www.openssl.org/news/secadv/20180612.txt", url: "https://www.openssl.org/news/secadv/20180612.txt", }, ], release_date: "2018-06-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", }, { cve: "CVE-2018-14404", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2018-06-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1595985", }, ], notes: [ { category: "description", text: "A null pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing invalid XPath expression. Applications processing untrusted XSL format inputs with the use of libxml2 library may be vulnerable to denial of service attack due to crash of the application.", title: "Vulnerability description", }, { category: "summary", text: "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14404", }, { category: "external", summary: "RHBZ#1595985", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1595985", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14404", url: "https://www.cve.org/CVERecord?id=CVE-2018-14404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14404", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14404", }, ], release_date: "2018-06-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Harry Sintonen", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16839", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-10-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1642201", }, ], notes: [ { category: "description", text: "Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.", title: "Vulnerability description", }, { category: "summary", text: "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16839", }, { category: "external", summary: "RHBZ#1642201", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1642201", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16839", url: "https://www.cve.org/CVERecord?id=CVE-2018-16839", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16839", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16839", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16839.html", url: "https://curl.haxx.se/docs/CVE-2018-16839.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16840", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2018-10-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1642203", }, ], notes: [ { category: "description", text: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", title: "Vulnerability description", }, { category: "summary", text: "curl: Use-after-free when closing \"easy\" handle in Curl_close()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16840", }, { category: "external", summary: "RHBZ#1642203", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1642203", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16840", url: "https://www.cve.org/CVERecord?id=CVE-2018-16840", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16840", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16840", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16840.html", url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Use-after-free when closing \"easy\" handle in Curl_close()", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16842", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-10-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1644124", }, ], notes: [ { category: "description", text: "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.", title: "Vulnerability description", }, { category: "summary", text: "curl: Heap-based buffer over-read in the curl tool warning formatting", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16842", }, { category: "external", summary: "RHBZ#1644124", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1644124", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16842", url: "https://www.cve.org/CVERecord?id=CVE-2018-16842", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16842", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16842", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16842.html", url: "https://curl.haxx.se/docs/CVE-2018-16842.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 3.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Heap-based buffer over-read in the curl tool warning formatting", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Wenxiang Qian", ], organization: "Tencent Blade Team", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16890", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670252", }, ], notes: [ { category: "description", text: "An out-of-bounds read flaw was found in the way curl handled NTLMv2 type-2 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", title: "Vulnerability description", }, { category: "summary", text: "curl: NTLM type-2 heap out-of-bounds buffer read", title: "Vulnerability summary", }, { category: "other", text: "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-2 headers, hence they are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16890", }, { category: "external", summary: "RHBZ#1670252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670252", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16890", url: "https://www.cve.org/CVERecord?id=CVE-2018-16890", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16890", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16890", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16890.html", url: "https://curl.haxx.se/docs/CVE-2018-16890.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Turn off NTLM authentication.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: NTLM type-2 heap out-of-bounds buffer read", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Zhouyihai Ding", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000005", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-01-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1536013", }, ], notes: [ { category: "description", text: "libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.", title: "Vulnerability description", }, { category: "summary", text: "curl: Out-of-bounds read in code handling HTTP/2 trailers", title: "Vulnerability summary", }, { category: "other", text: "This flaw was introduced in curl-7.49.0. Therefore the versions of curl shipped with Red Hat Enterprise Linux 5, 6 and 7 and Red Hat Ceph Storage 2 are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000005", }, { category: "external", summary: "RHBZ#1536013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1536013", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000005", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000005", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-824a.html", url: "https://curl.haxx.se/docs/adv_2018-824a.html", }, ], release_date: "2018-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Out-of-bounds read in code handling HTTP/2 trailers", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Craig de Stigter", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000007", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-01-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1537125", }, ], notes: [ { category: "description", text: "It was found that curl and libcurl might send their Authentication header to a third party HTTP server upon receiving an HTTP REDIRECT reply. This could leak authentication token to external entities.", title: "Vulnerability description", }, { category: "summary", text: "curl: HTTP authentication leak in redirects", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of curl as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of httpd24-curl as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000007", }, { category: "external", summary: "RHBZ#1537125", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1537125", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000007", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000007", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-b3bf.html", url: "https://curl.haxx.se/docs/adv_2018-b3bf.html", }, ], release_date: "2018-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "By default, curl and libcurl will not follow redirect requests.\nThis flaw happens only when curl or libcurl are explicitly requested to follow redirects (option --location in curl, and CURLOPT_FOLLOWLOCATION in libcurl).\nTo mitigate this, it is possible to prevent the automated following of redirects, replacing it by manual redirects (and remove the authentication header), for example.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: HTTP authentication leak in redirects", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Duy Phan Thanh", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000120", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2018-03-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1552628", }, ], notes: [ { category: "description", text: "It was found that libcurl did not safely parse FTP URLs when using the CURLOPT_FTP_FILEMETHOD method. An attacker, able to provide a specially crafted FTP URL to an application using libcurl, could write a NULL byte at an arbitrary location, resulting in a crash or an unspecified behavior.", title: "Vulnerability description", }, { category: "summary", text: "curl: FTP path trickery leads to NIL byte out of bounds write", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000120", }, { category: "external", summary: "RHBZ#1552628", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552628", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000120", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000120", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-9cd6.html", url: "https://curl.haxx.se/docs/adv_2018-9cd6.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Preventing application from using non-default CURLOPT_FTP_FILEMETHOD will avoid triggering the vulnerable code.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: FTP path trickery leads to NIL byte out of bounds write", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Dario Weisser", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000121", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2018-03-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1552631", }, ], notes: [ { category: "description", text: "A NULL pointer dereference flaw was found in the way libcurl checks values returned by the openldap ldap_get_attribute_ber() function. A malicious LDAP server could use this flaw to crash a libcurl client application via a specially crafted LDAP reply.", title: "Vulnerability description", }, { category: "summary", text: "curl: LDAP NULL pointer dereference", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000121", }, { category: "external", summary: "RHBZ#1552631", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552631", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000121", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000121", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-97a2.html", url: "https://curl.haxx.se/docs/adv_2018-97a2.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: LDAP NULL pointer dereference", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Max Dymond", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000122", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1553398", }, ], notes: [ { category: "description", text: "A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage", title: "Vulnerability description", }, { category: "summary", text: "curl: RTSP RTP buffer over-read", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000122", }, { category: "external", summary: "RHBZ#1553398", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1553398", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000122", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000122", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-b047.html", url: "https://curl.haxx.se/docs/adv_2018-b047.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: RTSP RTP buffer over-read", }, { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Wenxiang Qian", ], organization: "Tencent Blade Team", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-3822", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670254", }, ], notes: [ { category: "description", text: "A stack-based buffer overflow was found in the way curl handled NTLMv2 type-3 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", title: "Vulnerability description", }, { category: "summary", text: "curl: NTLMv2 type-3 header stack buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-3 headers, hence they are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3822", }, { category: "external", summary: "RHBZ#1670254", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670254", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3822", url: "https://www.cve.org/CVERecord?id=CVE-2019-3822", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3822", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3822", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-3822.html", url: "https://curl.haxx.se/docs/CVE-2019-3822.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Turn off NTLM authentication.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: NTLMv2 type-3 header stack buffer overflow", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-3823", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670256", }, ], notes: [ { category: "description", text: "An out-of-bounds read flaw was found in the way curl handled certain SMTP responses. A remote attacker could use this flaw to crash curl.", title: "Vulnerability description", }, { category: "summary", text: "curl: SMTP end-of-response out-of-bounds read", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3823", }, { category: "external", summary: "RHBZ#1670256", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670256", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3823", url: "https://www.cve.org/CVERecord?id=CVE-2019-3823", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3823", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3823", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-3823.html", url: "https://curl.haxx.se/docs/CVE-2019-3823.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Do not use SMTP authentication with curl", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: SMTP end-of-response out-of-bounds read", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "l00p3r", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-5436", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2019-05-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1710620", }, ], notes: [ { category: "description", text: "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.", title: "Vulnerability description", }, { category: "summary", text: "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function", title: "Vulnerability summary", }, { category: "other", text: "This flaw exists if the user selects to use a \"blksize\" of 504 or smaller (default is 512). The smaller size that is used, the larger the possible overflow becomes.\nUsers choosing a smaller size than default should be rare as the primary use case for changing the size is to make it larger. It is rare for users to use TFTP across the Internet. It is most commonly used within local networks.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-5436", }, { category: "external", summary: "RHBZ#1710620", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1710620", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-5436", url: "https://www.cve.org/CVERecord?id=CVE-2019-5436", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-5436", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-5436", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-5436.html", url: "https://curl.haxx.se/docs/CVE-2019-5436.html", }, ], release_date: "2019-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function", }, ], }
rhsa-2019:1543
Vulnerability from csaf_redhat
Published
2019-06-18 19:08
Modified
2025-03-17 01:13
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update
Notes
Topic
Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 packages for Microsoft Windows and Oracle Solaris are now available.
Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services
Apache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.
Security Fix(es):
* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)
* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)
* libxml2: NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of service (CVE-2018-14404)
* curl: Out-of-bounds read in code handling HTTP/2 trailers (CVE-2018-1000005)
* curl: HTTP authentication leak in redirects (CVE-2018-1000007)
* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120)
* curl: RTSP RTP buffer over-read (CVE-2018-1000122)
* httpd: privilege escalation from modules scripts (CVE-2019-0211)
Details around these issues, including information about CVEs, severity of the issues, and CVSS scores can be found on the CVE pages listed in the References section below.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 packages for Microsoft Windows and Oracle Solaris are now available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "This release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* libxml2: NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of service (CVE-2018-14404)\n\n* curl: Out-of-bounds read in code handling HTTP/2 trailers (CVE-2018-1000005)\n\n* curl: HTTP authentication leak in redirects (CVE-2018-1000007)\n\n* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120)\n\n* curl: RTSP RTP buffer over-read (CVE-2018-1000122)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around these issues, including information about CVEs, severity of the issues, and CVSS scores can be found on the CVE pages listed in the References section below.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1543", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", }, { category: "external", summary: "1536013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1536013", }, { category: "external", summary: "1537125", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1537125", }, { category: "external", summary: "1552628", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552628", }, { category: "external", summary: "1553398", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1553398", }, { category: "external", summary: "1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "1595985", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1595985", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "JBCS-722", url: "https://issues.redhat.com/browse/JBCS-722", }, { category: "external", summary: "JBCS-750", url: "https://issues.redhat.com/browse/JBCS-750", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1543.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update", tracking: { current_release_date: "2025-03-17T01:13:43+00:00", generator: { date: "2025-03-17T01:13:43+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2019:1543", initial_release_date: "2019-06-18T19:08:49+00:00", revision_history: [ { date: "2019-06-18T19:08:49+00:00", number: "1", summary: "Initial version", }, { date: "2019-06-18T19:08:49+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-17T01:13:43+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product: { name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_id: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1", }, }, }, ], category: "product_family", name: "Red Hat JBoss Core Services", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0495", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591163", }, ], notes: [ { category: "description", text: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", title: "Vulnerability description", }, { category: "summary", text: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", title: "Vulnerability summary", }, { category: "other", text: "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0495", }, { category: "external", summary: "RHBZ#1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0495", url: "https://www.cve.org/CVERecord?id=CVE-2018-0495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", }, { category: "external", summary: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, ], release_date: "2018-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", }, { cve: "CVE-2018-0732", cwe: { id: "CWE-325", name: "Missing Cryptographic Step", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591100", }, ], notes: [ { category: "description", text: "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", title: "Vulnerability description", }, { category: "summary", text: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0732", }, { category: "external", summary: "RHBZ#1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0732", url: "https://www.cve.org/CVERecord?id=CVE-2018-0732", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", }, { category: "external", summary: "https://www.openssl.org/news/secadv/20180612.txt", url: "https://www.openssl.org/news/secadv/20180612.txt", }, ], release_date: "2018-06-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", }, { cve: "CVE-2018-14404", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2018-06-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1595985", }, ], notes: [ { category: "description", text: "A null pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing invalid XPath expression. Applications processing untrusted XSL format inputs with the use of libxml2 library may be vulnerable to denial of service attack due to crash of the application.", title: "Vulnerability description", }, { category: "summary", text: "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14404", }, { category: "external", summary: "RHBZ#1595985", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1595985", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14404", url: "https://www.cve.org/CVERecord?id=CVE-2018-14404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14404", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14404", }, ], release_date: "2018-06-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Harry Sintonen", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16839", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-10-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1642201", }, ], notes: [ { category: "description", text: "Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.", title: "Vulnerability description", }, { category: "summary", text: "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16839", }, { category: "external", summary: "RHBZ#1642201", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1642201", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16839", url: "https://www.cve.org/CVERecord?id=CVE-2018-16839", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16839", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16839", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16839.html", url: "https://curl.haxx.se/docs/CVE-2018-16839.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16840", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2018-10-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1642203", }, ], notes: [ { category: "description", text: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", title: "Vulnerability description", }, { category: "summary", text: "curl: Use-after-free when closing \"easy\" handle in Curl_close()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16840", }, { category: "external", summary: "RHBZ#1642203", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1642203", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16840", url: "https://www.cve.org/CVERecord?id=CVE-2018-16840", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16840", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16840", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16840.html", url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Use-after-free when closing \"easy\" handle in Curl_close()", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16842", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-10-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1644124", }, ], notes: [ { category: "description", text: "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.", title: "Vulnerability description", }, { category: "summary", text: "curl: Heap-based buffer over-read in the curl tool warning formatting", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16842", }, { category: "external", summary: "RHBZ#1644124", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1644124", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16842", url: "https://www.cve.org/CVERecord?id=CVE-2018-16842", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16842", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16842", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16842.html", url: "https://curl.haxx.se/docs/CVE-2018-16842.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 3.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Heap-based buffer over-read in the curl tool warning formatting", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Wenxiang Qian", ], organization: "Tencent Blade Team", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16890", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670252", }, ], notes: [ { category: "description", text: "An out-of-bounds read flaw was found in the way curl handled NTLMv2 type-2 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", title: "Vulnerability description", }, { category: "summary", text: "curl: NTLM type-2 heap out-of-bounds buffer read", title: "Vulnerability summary", }, { category: "other", text: "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-2 headers, hence they are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16890", }, { category: "external", summary: "RHBZ#1670252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670252", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16890", url: "https://www.cve.org/CVERecord?id=CVE-2018-16890", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16890", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16890", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16890.html", url: "https://curl.haxx.se/docs/CVE-2018-16890.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Turn off NTLM authentication.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: NTLM type-2 heap out-of-bounds buffer read", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Zhouyihai Ding", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000005", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-01-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1536013", }, ], notes: [ { category: "description", text: "libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.", title: "Vulnerability description", }, { category: "summary", text: "curl: Out-of-bounds read in code handling HTTP/2 trailers", title: "Vulnerability summary", }, { category: "other", text: "This flaw was introduced in curl-7.49.0. Therefore the versions of curl shipped with Red Hat Enterprise Linux 5, 6 and 7 and Red Hat Ceph Storage 2 are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000005", }, { category: "external", summary: "RHBZ#1536013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1536013", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000005", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000005", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-824a.html", url: "https://curl.haxx.se/docs/adv_2018-824a.html", }, ], release_date: "2018-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Out-of-bounds read in code handling HTTP/2 trailers", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Craig de Stigter", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000007", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-01-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1537125", }, ], notes: [ { category: "description", text: "It was found that curl and libcurl might send their Authentication header to a third party HTTP server upon receiving an HTTP REDIRECT reply. This could leak authentication token to external entities.", title: "Vulnerability description", }, { category: "summary", text: "curl: HTTP authentication leak in redirects", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of curl as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of httpd24-curl as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000007", }, { category: "external", summary: "RHBZ#1537125", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1537125", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000007", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000007", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-b3bf.html", url: "https://curl.haxx.se/docs/adv_2018-b3bf.html", }, ], release_date: "2018-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "By default, curl and libcurl will not follow redirect requests.\nThis flaw happens only when curl or libcurl are explicitly requested to follow redirects (option --location in curl, and CURLOPT_FOLLOWLOCATION in libcurl).\nTo mitigate this, it is possible to prevent the automated following of redirects, replacing it by manual redirects (and remove the authentication header), for example.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: HTTP authentication leak in redirects", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Duy Phan Thanh", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000120", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2018-03-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1552628", }, ], notes: [ { category: "description", text: "It was found that libcurl did not safely parse FTP URLs when using the CURLOPT_FTP_FILEMETHOD method. An attacker, able to provide a specially crafted FTP URL to an application using libcurl, could write a NULL byte at an arbitrary location, resulting in a crash or an unspecified behavior.", title: "Vulnerability description", }, { category: "summary", text: "curl: FTP path trickery leads to NIL byte out of bounds write", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000120", }, { category: "external", summary: "RHBZ#1552628", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552628", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000120", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000120", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-9cd6.html", url: "https://curl.haxx.se/docs/adv_2018-9cd6.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Preventing application from using non-default CURLOPT_FTP_FILEMETHOD will avoid triggering the vulnerable code.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: FTP path trickery leads to NIL byte out of bounds write", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Dario Weisser", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000121", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2018-03-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1552631", }, ], notes: [ { category: "description", text: "A NULL pointer dereference flaw was found in the way libcurl checks values returned by the openldap ldap_get_attribute_ber() function. A malicious LDAP server could use this flaw to crash a libcurl client application via a specially crafted LDAP reply.", title: "Vulnerability description", }, { category: "summary", text: "curl: LDAP NULL pointer dereference", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000121", }, { category: "external", summary: "RHBZ#1552631", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552631", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000121", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000121", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-97a2.html", url: "https://curl.haxx.se/docs/adv_2018-97a2.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: LDAP NULL pointer dereference", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Max Dymond", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000122", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1553398", }, ], notes: [ { category: "description", text: "A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage", title: "Vulnerability description", }, { category: "summary", text: "curl: RTSP RTP buffer over-read", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000122", }, { category: "external", summary: "RHBZ#1553398", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1553398", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000122", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000122", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-b047.html", url: "https://curl.haxx.se/docs/adv_2018-b047.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: RTSP RTP buffer over-read", }, { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Wenxiang Qian", ], organization: "Tencent Blade Team", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-3822", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670254", }, ], notes: [ { category: "description", text: "A stack-based buffer overflow was found in the way curl handled NTLMv2 type-3 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", title: "Vulnerability description", }, { category: "summary", text: "curl: NTLMv2 type-3 header stack buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-3 headers, hence they are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3822", }, { category: "external", summary: "RHBZ#1670254", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670254", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3822", url: "https://www.cve.org/CVERecord?id=CVE-2019-3822", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3822", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3822", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-3822.html", url: "https://curl.haxx.se/docs/CVE-2019-3822.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Turn off NTLM authentication.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: NTLMv2 type-3 header stack buffer overflow", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-3823", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670256", }, ], notes: [ { category: "description", text: "An out-of-bounds read flaw was found in the way curl handled certain SMTP responses. A remote attacker could use this flaw to crash curl.", title: "Vulnerability description", }, { category: "summary", text: "curl: SMTP end-of-response out-of-bounds read", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3823", }, { category: "external", summary: "RHBZ#1670256", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670256", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3823", url: "https://www.cve.org/CVERecord?id=CVE-2019-3823", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3823", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3823", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-3823.html", url: "https://curl.haxx.se/docs/CVE-2019-3823.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Do not use SMTP authentication with curl", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: SMTP end-of-response out-of-bounds read", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "l00p3r", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-5436", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2019-05-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1710620", }, ], notes: [ { category: "description", text: "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.", title: "Vulnerability description", }, { category: "summary", text: "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function", title: "Vulnerability summary", }, { category: "other", text: "This flaw exists if the user selects to use a \"blksize\" of 504 or smaller (default is 512). The smaller size that is used, the larger the possible overflow becomes.\nUsers choosing a smaller size than default should be rare as the primary use case for changing the size is to make it larger. It is rare for users to use TFTP across the Internet. It is most commonly used within local networks.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-5436", }, { category: "external", summary: "RHBZ#1710620", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1710620", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-5436", url: "https://www.cve.org/CVERecord?id=CVE-2019-5436", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-5436", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-5436", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-5436.html", url: "https://curl.haxx.se/docs/CVE-2019-5436.html", }, ], release_date: "2019-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function", }, ], }
wid-sec-w-2023-1641
Vulnerability from csaf_certbund
Published
2018-10-30 23:00
Modified
2023-07-04 22:00
Summary
cURL: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
cURL ist eine Client-Software, die das Austauschen von Dateien mittels mehrerer Protokolle wie z. B. HTTP oder FTP erlaubt.
libcurl ist eine Bibliothek für Client-Software, die das Austauschen von Dateien mittels mehrerer Protokolle wie z. B. HTTP oder FTP erlaubt.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in cURL und libcurl ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen und um einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "cURL ist eine Client-Software, die das Austauschen von Dateien mittels mehrerer Protokolle wie z. B. HTTP oder FTP erlaubt.\r\nlibcurl ist eine Bibliothek für Client-Software, die das Austauschen von Dateien mittels mehrerer Protokolle wie z. B. HTTP oder FTP erlaubt.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in cURL und libcurl ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen und um einen nicht näher spezifizierten Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1641 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2023-1641.json", }, { category: "self", summary: "WID-SEC-2023-1641 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1641", }, { category: "external", summary: "Security update for Dell NetWorker", url: "https://www.dell.com/support/kbdoc/de-de/000215497/dsa-2023-233-security-update-for-dell-networker-curl-7-51-0", }, { category: "external", summary: "Curl CVE-2018-16842 vom 2018-10-31", url: "https://curl.haxx.se/docs/CVE-2018-16842.html", }, { category: "external", summary: "Curl CVE-2018-16840 vom 2018-10-31", url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, { category: "external", summary: "Curl CVE-2018-16839 vom 2018-10-31", url: "https://curl.haxx.se/docs/CVE-2018-16839.html", }, { category: "external", summary: "Ubuntu Security Notice USN-3805-1 vom 2018-11-01", url: "http://www.ubuntu.com/usn/usn-3805-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3608-1 vom 2018-11-03", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183608-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3607-1 vom 2018-11-03", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183607-1.html", }, { category: "external", summary: "Debian Security Advisory DSA-4331 vom 2018-11-03", url: "https://www.debian.org/security/2018/dsa-4331", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3624-1 vom 2018-11-06", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183624-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3681-1 vom 2018-11-09", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183681-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0339-1 vom 2019-02-13", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190339-1.html", }, { category: "external", summary: "Gentoo Security Advisory GLSA 201903-03 vom 2019-03-10", url: "https://security.gentoo.org/glsa/201903-03", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0996-1 vom 2019-04-24", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190996-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2181 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2181", }, ], source_lang: "en-US", title: "cURL: Mehrere Schwachstellen", tracking: { current_release_date: "2023-07-04T22:00:00.000+00:00", generator: { date: "2024-08-15T17:54:09.061+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1641", initial_release_date: "2018-10-30T23:00:00.000+00:00", revision_history: [ { date: "2018-10-30T23:00:00.000+00:00", number: "1", summary: "Initial Release", }, { date: "2018-10-31T23:00:00.000+00:00", number: "2", summary: "New remediations available", }, { date: "2018-11-04T23:00:00.000+00:00", number: "3", summary: "New remediations available", }, { date: "2018-11-05T23:00:00.000+00:00", number: "4", summary: "New remediations available", }, { date: "2018-11-11T23:00:00.000+00:00", number: "5", summary: "New remediations available", }, { date: "2018-11-15T23:00:00.000+00:00", number: "6", summary: "Added references", }, { date: "2019-02-13T23:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-03-10T23:00:00.000+00:00", number: "8", summary: "Neue Updates von GENTOO aufgenommen", }, { date: "2019-03-11T23:00:00.000+00:00", number: "9", summary: "Referenz(en) aufgenommen: GLSA-201903-03", }, { date: "2019-04-24T22:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-08-06T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-07-04T22:00:00.000+00:00", number: "12", summary: "Neue Updates von Dell aufgenommen", }, ], status: "final", version: "12", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Dell NetWorker < 19.9.0.1", product: { name: "Dell NetWorker < 19.9.0.1", product_id: "T028404", product_identification_helper: { cpe: "cpe:/a:dell:networker:19.9.0.1", }, }, }, ], category: "vendor", name: "Dell", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "Open Source cURL < 7.62.0", product: { name: "Open Source cURL < 7.62.0", product_id: "T013017", product_identification_helper: { cpe: "cpe:/a:curl:curl:7.62.0", }, }, }, { category: "product_name", name: "Open Source libcurl < 7.62.0", product: { name: "Open Source libcurl < 7.62.0", product_id: "T013018", product_identification_helper: { cpe: "cpe:/a:open_source:libcurl:7.62.0", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2018-16839", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in libcurl im SASL-Authentifizierungscode von libcurl aufgrund eines Fehlers bei der Längenüberprüfung in der Funktion \"Curl_auth_create_plain_message\". Ein Angreifer kann diesen Heap-Überlauf mit nicht spezifizierten Auswirkungen ausnutzen, indem er zu lange Benutzernamen- und Passworteingaben macht. Die betroffene Funktion kann nur bei Verwendung von POP3(S), IMAP(S) oder SMTP(S) aufgerufen werden.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T028404", "T012167", ], }, release_date: "2018-10-30T23:00:00.000+00:00", title: "CVE-2018-16839", }, { cve: "CVE-2018-16840", notes: [ { category: "description", text: "Es existiert eine heap use-after-free Schwachstelle in cURL und libcurl in der \"Curl_close()\" Funktion. Ein Angreifer kann dies ausnutzen, um einen Denial of Service zu erstellen oder andere nicht spezifizierte Auswirkungen zu erzielen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen eine modifizierte URL oder Webseite in seinem Web-Browser zu öffnen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T028404", "T012167", ], }, release_date: "2018-10-30T23:00:00.000+00:00", title: "CVE-2018-16840", }, { cve: "CVE-2018-16842", notes: [ { category: "description", text: "Es besteht eine Heap-out-of-buffer-read Schwachstelle in cURL und libcurl aufgrund eines Fehlers in der Wrap-Logik einer generischen Funktion zur Anzeige von Warn- und Informationsmeldungen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen oder einen Denial-of-Service Zustand zu erzeugen, wenn Curl in einem Serverkontext verwendet wird.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T028404", "T012167", ], }, release_date: "2018-10-30T23:00:00.000+00:00", title: "CVE-2018-16842", }, ], }
WID-SEC-W-2023-1641
Vulnerability from csaf_certbund
Published
2018-10-30 23:00
Modified
2023-07-04 22:00
Summary
cURL: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
cURL ist eine Client-Software, die das Austauschen von Dateien mittels mehrerer Protokolle wie z. B. HTTP oder FTP erlaubt.
libcurl ist eine Bibliothek für Client-Software, die das Austauschen von Dateien mittels mehrerer Protokolle wie z. B. HTTP oder FTP erlaubt.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in cURL und libcurl ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen und um einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "cURL ist eine Client-Software, die das Austauschen von Dateien mittels mehrerer Protokolle wie z. B. HTTP oder FTP erlaubt.\r\nlibcurl ist eine Bibliothek für Client-Software, die das Austauschen von Dateien mittels mehrerer Protokolle wie z. B. HTTP oder FTP erlaubt.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in cURL und libcurl ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen und um einen nicht näher spezifizierten Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1641 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2023-1641.json", }, { category: "self", summary: "WID-SEC-2023-1641 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1641", }, { category: "external", summary: "Security update for Dell NetWorker", url: "https://www.dell.com/support/kbdoc/de-de/000215497/dsa-2023-233-security-update-for-dell-networker-curl-7-51-0", }, { category: "external", summary: "Curl CVE-2018-16842 vom 2018-10-31", url: "https://curl.haxx.se/docs/CVE-2018-16842.html", }, { category: "external", summary: "Curl CVE-2018-16840 vom 2018-10-31", url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, { category: "external", summary: "Curl CVE-2018-16839 vom 2018-10-31", url: "https://curl.haxx.se/docs/CVE-2018-16839.html", }, { category: "external", summary: "Ubuntu Security Notice USN-3805-1 vom 2018-11-01", url: "http://www.ubuntu.com/usn/usn-3805-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3608-1 vom 2018-11-03", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183608-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3607-1 vom 2018-11-03", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183607-1.html", }, { category: "external", summary: "Debian Security Advisory DSA-4331 vom 2018-11-03", url: "https://www.debian.org/security/2018/dsa-4331", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3624-1 vom 2018-11-06", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183624-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:3681-1 vom 2018-11-09", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183681-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0339-1 vom 2019-02-13", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190339-1.html", }, { category: "external", summary: "Gentoo Security Advisory GLSA 201903-03 vom 2019-03-10", url: "https://security.gentoo.org/glsa/201903-03", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0996-1 vom 2019-04-24", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190996-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2181 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2181", }, ], source_lang: "en-US", title: "cURL: Mehrere Schwachstellen", tracking: { current_release_date: "2023-07-04T22:00:00.000+00:00", generator: { date: "2024-08-15T17:54:09.061+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1641", initial_release_date: "2018-10-30T23:00:00.000+00:00", revision_history: [ { date: "2018-10-30T23:00:00.000+00:00", number: "1", summary: "Initial Release", }, { date: "2018-10-31T23:00:00.000+00:00", number: "2", summary: "New remediations available", }, { date: "2018-11-04T23:00:00.000+00:00", number: "3", summary: "New remediations available", }, { date: "2018-11-05T23:00:00.000+00:00", number: "4", summary: "New remediations available", }, { date: "2018-11-11T23:00:00.000+00:00", number: "5", summary: "New remediations available", }, { date: "2018-11-15T23:00:00.000+00:00", number: "6", summary: "Added references", }, { date: "2019-02-13T23:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-03-10T23:00:00.000+00:00", number: "8", summary: "Neue Updates von GENTOO aufgenommen", }, { date: "2019-03-11T23:00:00.000+00:00", number: "9", summary: "Referenz(en) aufgenommen: GLSA-201903-03", }, { date: "2019-04-24T22:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-08-06T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-07-04T22:00:00.000+00:00", number: "12", summary: "Neue Updates von Dell aufgenommen", }, ], status: "final", version: "12", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Dell NetWorker < 19.9.0.1", product: { name: "Dell NetWorker < 19.9.0.1", product_id: "T028404", product_identification_helper: { cpe: "cpe:/a:dell:networker:19.9.0.1", }, }, }, ], category: "vendor", name: "Dell", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "Open Source cURL < 7.62.0", product: { name: "Open Source cURL < 7.62.0", product_id: "T013017", product_identification_helper: { cpe: "cpe:/a:curl:curl:7.62.0", }, }, }, { category: "product_name", name: "Open Source libcurl < 7.62.0", product: { name: "Open Source libcurl < 7.62.0", product_id: "T013018", product_identification_helper: { cpe: "cpe:/a:open_source:libcurl:7.62.0", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2018-16839", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in libcurl im SASL-Authentifizierungscode von libcurl aufgrund eines Fehlers bei der Längenüberprüfung in der Funktion \"Curl_auth_create_plain_message\". Ein Angreifer kann diesen Heap-Überlauf mit nicht spezifizierten Auswirkungen ausnutzen, indem er zu lange Benutzernamen- und Passworteingaben macht. Die betroffene Funktion kann nur bei Verwendung von POP3(S), IMAP(S) oder SMTP(S) aufgerufen werden.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T028404", "T012167", ], }, release_date: "2018-10-30T23:00:00.000+00:00", title: "CVE-2018-16839", }, { cve: "CVE-2018-16840", notes: [ { category: "description", text: "Es existiert eine heap use-after-free Schwachstelle in cURL und libcurl in der \"Curl_close()\" Funktion. Ein Angreifer kann dies ausnutzen, um einen Denial of Service zu erstellen oder andere nicht spezifizierte Auswirkungen zu erzielen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen eine modifizierte URL oder Webseite in seinem Web-Browser zu öffnen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T028404", "T012167", ], }, release_date: "2018-10-30T23:00:00.000+00:00", title: "CVE-2018-16840", }, { cve: "CVE-2018-16842", notes: [ { category: "description", text: "Es besteht eine Heap-out-of-buffer-read Schwachstelle in cURL und libcurl aufgrund eines Fehlers in der Wrap-Logik einer generischen Funktion zur Anzeige von Warn- und Informationsmeldungen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen oder einen Denial-of-Service Zustand zu erzeugen, wenn Curl in einem Serverkontext verwendet wird.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T028404", "T012167", ], }, release_date: "2018-10-30T23:00:00.000+00:00", title: "CVE-2018-16842", }, ], }
ghsa-6vwf-m72q-cw8h
Vulnerability from github
Published
2022-05-13 01:34
Modified
2022-05-13 01:34
Severity ?
Details
A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the Curl_close()
function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.
{ affected: [], aliases: [ "CVE-2018-16840", ], database_specific: { cwe_ids: [ "CWE-416", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2018-10-31T18:29:00Z", severity: "CRITICAL", }, details: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", id: "GHSA-6vwf-m72q-cw8h", modified: "2022-05-13T01:34:06Z", published: "2022-05-13T01:34:06Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16840", }, { type: "WEB", url: "https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840", }, { type: "WEB", url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201903-03", }, { type: "WEB", url: "https://usn.ubuntu.com/3805-1", }, { type: "WEB", url: "http://www.securitytracker.com/id/1042013", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
fkie_cve-2018-16840
Vulnerability from fkie_nvd
Published
2018-10-31 18:29
Modified
2024-11-21 03:53
Severity ?
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | curl | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*", matchCriteriaId: "221B8B10-497F-42ED-B4E1-0E02B6F0C6A1", versionEndIncluding: "7.61.1", versionStartIncluding: "7.59.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", matchCriteriaId: "07C312A0-CD2C-4B9C-B064-6409B25C278F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", }, { lang: "es", value: "Se ha detectado un error de uso de memoria dinámica (heap) previamente liberada en Curl, desde la versión 7.59.0 hasta la 7.61.1, en el código relacionado con el cierre de un controlador \"easy\". Al cerrar y limpiar un controlador \"easy\" en la función \"Curl_close()\", el código de la biblioteca libera, en primer lugar, un struct (sin pasar el puntero a null) y, después, podría escribir erróneamente en un campo struct dentro del struct ya liberado.", }, ], id: "CVE-2018-16840", lastModified: "2024-11-21T03:53:25.240", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "secalert@redhat.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-10-31T18:29:00.307", references: [ { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1042013", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, { source: "secalert@redhat.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-03", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3805-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1042013", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-03", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3805-1/", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-416", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-416", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.