SUSE-SU-2016:2449-1: moderate: Security update for curl
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Oct 4 09:10:01 MDT 2016
SUSE Security Update: Security update for curl
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2449-1
Rating: moderate
References: #991389 #991390 #997420
Cross-References: CVE-2016-5419 CVE-2016-5420 CVE-2016-7141
Affected Products:
SUSE OpenStack Cloud 5
SUSE Manager Proxy 2.1
SUSE Manager 2.1
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Server 11-SECURITY
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for curl fixes the following issues:
- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-7141: Fixed incorrect reuse of client certificates (bsc#997420).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 5:
zypper in -t patch sleclo50sp3-curl-12772=1
- SUSE Manager Proxy 2.1:
zypper in -t patch slemap21-curl-12772=1
- SUSE Manager 2.1:
zypper in -t patch sleman21-curl-12772=1
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-curl-12772=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-curl-12772=1
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-curl-12772=1
- SUSE Linux Enterprise Server 11-SECURITY:
zypper in -t patch secsp3-curl-12772=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-curl-12772=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-curl-12772=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-curl-12772=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 5 (x86_64):
curl-7.19.7-1.61.1
libcurl4-32bit-7.19.7-1.61.1
libcurl4-7.19.7-1.61.1
- SUSE Manager Proxy 2.1 (x86_64):
curl-7.19.7-1.61.1
libcurl4-32bit-7.19.7-1.61.1
libcurl4-7.19.7-1.61.1
- SUSE Manager 2.1 (s390x x86_64):
curl-7.19.7-1.61.1
libcurl4-32bit-7.19.7-1.61.1
libcurl4-7.19.7-1.61.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
libcurl-devel-7.19.7-1.61.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
curl-7.19.7-1.61.1
libcurl4-7.19.7-1.61.1
- SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):
libcurl4-32bit-7.19.7-1.61.1
- SUSE Linux Enterprise Server 11-SP4 (ia64):
libcurl4-x86-7.19.7-1.61.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):
curl-7.19.7-1.61.1
libcurl4-7.19.7-1.61.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (s390x x86_64):
libcurl4-32bit-7.19.7-1.61.1
- SUSE Linux Enterprise Server 11-SECURITY (i586 ia64 ppc64 s390x x86_64):
curl-openssl1-7.19.7-1.61.1
libcurl4-openssl1-7.19.7-1.61.1
- SUSE Linux Enterprise Server 11-SECURITY (ppc64 s390x x86_64):
libcurl4-openssl1-32bit-7.19.7-1.61.1
- SUSE Linux Enterprise Server 11-SECURITY (ia64):
libcurl4-openssl1-x86-7.19.7-1.61.1
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
curl-7.19.7-1.61.1
libcurl4-7.19.7-1.61.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
curl-debuginfo-7.19.7-1.61.1
curl-debugsource-7.19.7-1.61.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
curl-debuginfo-7.19.7-1.61.1
curl-debugsource-7.19.7-1.61.1
References:
https://www.suse.com/security/cve/CVE-2016-5419.html
https://www.suse.com/security/cve/CVE-2016-5420.html
https://www.suse.com/security/cve/CVE-2016-7141.html
https://bugzilla.suse.com/991389
https://bugzilla.suse.com/991390
https://bugzilla.suse.com/997420
More information about the sle-security-updates
mailing list