SUSE-SU-2024:4036-1: moderate: Security update for httpcomponents-client, httpcomponents-core

SLE-SECURITY-UPDATES null at suse.de
Mon Nov 18 16:30:05 UTC 2024



# Security update for httpcomponents-client, httpcomponents-core

Announcement ID: SUSE-SU-2024:4036-1  
Release Date: 2024-11-18T15:24:16Z  
Rating: moderate  
References:

  * bsc#1177488

  
Cross-References:

  * CVE-2020-13956

  
CVSS scores:

  * CVE-2020-13956 ( SUSE ):  5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
  * CVE-2020-13956 ( NVD ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

  
Affected Products:

  * Development Tools Module 15-SP5
  * Development Tools Module 15-SP6
  * openSUSE Leap 15.5
  * openSUSE Leap 15.6
  * SUSE Linux Enterprise Desktop 15 SP5
  * SUSE Linux Enterprise Desktop 15 SP6
  * SUSE Linux Enterprise High Performance Computing 15 SP5
  * SUSE Linux Enterprise Real Time 15 SP5
  * SUSE Linux Enterprise Real Time 15 SP6
  * SUSE Linux Enterprise Server 15 SP5
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15 SP5
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6
  * SUSE Manager Server 4.3
  * SUSE Manager Server 4.3 Module 4.3

  
  
An update that solves one vulnerability can now be installed.

## Description:

This update for httpcomponents-client, httpcomponents-core fixes the following
issues:

httpcomponents-client: \- Update to version 4.5.14 * HTTPCLIENT-2206: Corrected
resource de-allocation by fluent response objects. * HTTPCLIENT-2174: URIBuilder
to return a new empty list instead of unmodifiable Collections#emptyList. *
Don't retry requests in case of NoRouteToHostException. * HTTPCLIENT-2144:
RequestBuilder fails to correctly copy charset of requests with form url-encoded
body. * PR #269: 4.5.x use array fill and more. \+ Use Arrays.fill(). \+ Remove
redundant modifiers. \+ Use Collections.addAll() and Collection.addAll() APIs
instead of loops. \+ Remove redundant returns. \+ No need to explicitly declare
an array when calling a vararg method. \+ Remote extra semicolons (;). \+ Use a
'L' instead of 'l' to make long literals more readable. *
PublicSuffixListParser.parseByType(Reader) allocates but does not use a 256 char
StringBuilder. * Incorrect handling of malformed authority component by
URIUtils#extractHost (bsc#1177488, CVE-2020-13956). * Avoid updating Content-
Length header in a 304 response. * Bug fix: BasicExpiresHandler is annotated as
immutable but is not (#239) * HTTPCLIENT-2076: Fixed NPE in LaxExpiresHandler.

httpcomponents-core: \- Upgraded to version 4.4.14 * PR #231: 4.4.x Use better
map apis and more. \+ Remove redundant modifiers. \+ Use Collections.addAll()
API instead of loops. \+ Remove redundant returns. \+ No need to explicitly
declare an array when calling a vararg method. \+ Remote extra semicolons (;). *
Bug fix: Non-blocking TLSv1.3 connections can end up in an infinite event spin
when closed concurrently by the local and the remote endpoints. * HTTPCORE-647:
Non-blocking connection terminated due to 'java.io.IOException: Broken pipe' can
enter an infinite loop flushing buffered output data. * PR #201, HTTPCORE-634:
Fix race condition in AbstractConnPool that can cause internal state corruption
when persistent connections are manually removed from the pool.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.5  
    zypper in -t patch openSUSE-SLE-15.5-2024-4036=1

  * openSUSE Leap 15.6  
    zypper in -t patch openSUSE-SLE-15.6-2024-4036=1

  * Development Tools Module 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4036=1

  * Development Tools Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4036=1

  * SUSE Manager Server 4.3 Module 4.3  
    zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-4036=1

## Package List:

  * openSUSE Leap 15.5 (noarch)
    * httpcomponents-client-cache-4.5.14-150200.3.9.1
    * httpcomponents-core-4.4.14-150200.3.9.1
    * httpcomponents-client-4.5.14-150200.3.9.1
    * httpcomponents-client-javadoc-4.5.14-150200.3.9.1
    * httpcomponents-core-javadoc-4.4.14-150200.3.9.1
  * openSUSE Leap 15.6 (noarch)
    * httpcomponents-client-cache-4.5.14-150200.3.9.1
    * httpcomponents-core-4.4.14-150200.3.9.1
    * httpcomponents-client-4.5.14-150200.3.9.1
    * httpcomponents-client-javadoc-4.5.14-150200.3.9.1
    * httpcomponents-core-javadoc-4.4.14-150200.3.9.1
  * Development Tools Module 15-SP5 (noarch)
    * httpcomponents-client-4.5.14-150200.3.9.1
    * httpcomponents-core-4.4.14-150200.3.9.1
  * Development Tools Module 15-SP6 (noarch)
    * httpcomponents-client-4.5.14-150200.3.9.1
    * httpcomponents-core-4.4.14-150200.3.9.1
  * SUSE Manager Server 4.3 Module 4.3 (noarch)
    * httpcomponents-client-4.5.14-150200.3.9.1
    * httpcomponents-core-4.4.14-150200.3.9.1

## References:

  * https://www.suse.com/security/cve/CVE-2020-13956.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1177488

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20241118/ec1cab71/attachment.htm>


More information about the sle-security-updates mailing list