Pufferüberlauf in curl
ID: | SUSE-SU-2019:2339-1 |
Distribution: | SUSE |
Plattformen: | SUSE CaaS Platform 3.0 |
Datum: | Di, 10. September 2019, 15:31 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482 |
Applikationen: | curl |
Originalnachricht |
|
SUSE Security Update: Security update for curl ______________________________________________________________________________ Announcement ID: SUSE-SU-2019:2339-1 Rating: moderate References: #1149496 Cross-References: CVE-2019-5482 Affected Products: SUSE CaaS Platform 3.0 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for curl fixes the following issues: Security issue fixed: - CVE-2019-5482: Fixed TFTP small blocksize heap buffer overflow (bsc#1149496). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE CaaS Platform 3.0: To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: - SUSE CaaS Platform 3.0 (x86_64): curl-7.37.0-37.43.1 curl-debuginfo-7.37.0-37.43.1 curl-debugsource-7.37.0-37.43.1 libcurl4-7.37.0-37.43.1 libcurl4-debuginfo-7.37.0-37.43.1 References: https://www.suse.com/security/cve/CVE-2019-5482.html https://bugzilla.suse.com/1149496 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates |