SUSE-SU-2015:0179-1: moderate: Security update for curl
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Fri Jan 30 17:04:53 MST 2015
SUSE Security Update: Security update for curl
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0179-1
Rating: moderate
References: #870444 #884698 #885302 #894575 #897816 #901924
#911363
Cross-References: CVE-2014-3613 CVE-2014-3707 CVE-2014-8150
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Security Module 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that solves three vulnerabilities and has four
fixes is now available.
Description:
This update fixes the following security issues:
*
CVE-2014-8150: URL request injection (bnc#911363)
When libcurl sends a request to a server via a HTTP proxy, it copies
the entire URL into the request and sends if off.
If the given URL contains line feeds and carriage returns those will
be sent along to the proxy too, which allows the program to for example
send a separate HTTP request injected embedded in the URL.
*
CVE-2014-3707: duphandle read out of bounds (bnc#901924)
*
CVE-2014-3613: libcurl cookie leaks (bnc#894575)
Additional bug fixed:
* curl_multi_remove_handle: don't crash on multiple removes
(bnc#897816)
Security Issues:
* CVE-2014-8150
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150>
* CVE-2014-3613
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613>
* CVE-2014-3707
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-curl-201501-10166
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-curl-201501-10166
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-curl-201501-10166
- SUSE Linux Enterprise Security Module 11 SP3:
zypper in -t patch secsp3-curl-201501-10166
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-curl-201501-10166
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
libcurl-devel-7.19.7-1.40.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
curl-7.19.7-1.40.1
libcurl4-7.19.7-1.40.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):
libcurl4-32bit-7.19.7-1.40.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
curl-7.19.7-1.40.1
libcurl4-7.19.7-1.40.1
- SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):
libcurl4-32bit-7.19.7-1.40.1
- SUSE Linux Enterprise Server 11 SP3 (ia64):
libcurl4-x86-7.19.7-1.40.1
- SUSE Linux Enterprise Security Module 11 SP3 (i586 ia64 ppc64 s390x x86_64):
libcurl4-openssl1-7.19.7-0.40.1
- SUSE Linux Enterprise Security Module 11 SP3 (ppc64 s390x x86_64):
libcurl4-openssl1-32bit-7.19.7-0.40.1
- SUSE Linux Enterprise Security Module 11 SP3 (ia64):
libcurl4-openssl1-x86-7.19.7-0.40.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
curl-7.19.7-1.40.1
libcurl4-7.19.7-1.40.1
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
libcurl4-32bit-7.19.7-1.40.1
References:
http://support.novell.com/security/cve/CVE-2014-3613.html
http://support.novell.com/security/cve/CVE-2014-3707.html
http://support.novell.com/security/cve/CVE-2014-8150.html
https://bugzilla.suse.com/show_bug.cgi?id=870444
https://bugzilla.suse.com/show_bug.cgi?id=884698
https://bugzilla.suse.com/show_bug.cgi?id=885302
https://bugzilla.suse.com/show_bug.cgi?id=894575
https://bugzilla.suse.com/show_bug.cgi?id=897816
https://bugzilla.suse.com/show_bug.cgi?id=901924
https://bugzilla.suse.com/show_bug.cgi?id=911363
http://download.suse.com/patch/finder/?keywords=058c7ca165aac16861c50a9159fc2d64
More information about the sle-security-updates
mailing list