File _patchinfo of Package patchinfo.6879
<patchinfo incident="6879">
<issue id="1084521" tracker="bnc">VUL-1: CVE-2018-1000120: curl: FTP path trickery leads to NIL byte out of bounds write</issue>
<issue id="1084532" tracker="bnc">VUL-0: CVE-2018-1000122: curl: RTSP RTP buffer over-read</issue>
<issue id="1084524" tracker="bnc">VUL-1: CVE-2018-1000121: curl: LDAP NULL pointer dereference</issue>
<issue id="2018-1000120" tracker="cve" />
<issue id="2018-1000121" tracker="cve" />
<issue id="2018-1000122" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>pmonrealgonzalez</packager>
<description>This update for curl fixes the following issues:
Following security issues were fixed:
- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).
</description>
<summary>Security update for curl</summary>
</patchinfo>