<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for curl</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:2731-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-09-15T08:12:01Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-09-15T08:12:01Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-09-15T08:12:01Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for curl</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for curl fixes the following issues:

This security issue was fixed:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
  (bsc#1106019)

This non-security issue was fixed:

- Use OPENSSL_config instead of CONF_modules_load_file() to avoid crashes due
  to openssl engines conflicts (bsc#1086367)

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-09/msg00030.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:2731-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="curl-7.60.0-lp150.2.12.1">
      <FullProductName ProductID="curl-7.60.0-lp150.2.12.1">curl-7.60.0-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="curl-mini-7.60.0-lp150.2.12.1">
      <FullProductName ProductID="curl-mini-7.60.0-lp150.2.12.1">curl-mini-7.60.0-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-7.60.0-lp150.2.12.1">
      <FullProductName ProductID="libcurl-devel-7.60.0-lp150.2.12.1">libcurl-devel-7.60.0-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-32bit-7.60.0-lp150.2.12.1">
      <FullProductName ProductID="libcurl-devel-32bit-7.60.0-lp150.2.12.1">libcurl-devel-32bit-7.60.0-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-mini-devel-7.60.0-lp150.2.12.1">
      <FullProductName ProductID="libcurl-mini-devel-7.60.0-lp150.2.12.1">libcurl-mini-devel-7.60.0-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-7.60.0-lp150.2.12.1">
      <FullProductName ProductID="libcurl4-7.60.0-lp150.2.12.1">libcurl4-7.60.0-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-7.60.0-lp150.2.12.1">
      <FullProductName ProductID="libcurl4-32bit-7.60.0-lp150.2.12.1">libcurl4-32bit-7.60.0-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-mini-7.60.0-lp150.2.12.1">
      <FullProductName ProductID="libcurl4-mini-7.60.0-lp150.2.12.1">libcurl4-mini-7.60.0-lp150.2.12.1</FullProductName>
    </Branch>
    <Relationship ProductReference="curl-7.60.0-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:curl-7.60.0-lp150.2.12.1">curl-7.60.0-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-mini-7.60.0-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:curl-mini-7.60.0-lp150.2.12.1">curl-mini-7.60.0-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-7.60.0-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libcurl-devel-7.60.0-lp150.2.12.1">libcurl-devel-7.60.0-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-32bit-7.60.0-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libcurl-devel-32bit-7.60.0-lp150.2.12.1">libcurl-devel-32bit-7.60.0-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-mini-devel-7.60.0-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libcurl-mini-devel-7.60.0-lp150.2.12.1">libcurl-mini-devel-7.60.0-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-7.60.0-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libcurl4-7.60.0-lp150.2.12.1">libcurl4-7.60.0-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-7.60.0-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libcurl4-32bit-7.60.0-lp150.2.12.1">libcurl4-32bit-7.60.0-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-mini-7.60.0-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libcurl4-mini-7.60.0-lp150.2.12.1">libcurl4-mini-7.60.0-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)</Note>
    </Notes>
    <CVE>CVE-2018-14618</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:curl-7.60.0-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:curl-mini-7.60.0-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl-devel-32bit-7.60.0-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl-devel-7.60.0-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl-mini-devel-7.60.0-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl4-32bit-7.60.0-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl4-7.60.0-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libcurl4-mini-7.60.0-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-09/msg00030.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14618.html</URL>
        <Description>CVE-2018-14618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106019</URL>
        <Description>SUSE Bug 1106019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112758</URL>
        <Description>SUSE Bug 1112758</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
