SUSE-SU-2015:0179-1: moderate: Security update for curl

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Jan 30 17:04:53 MST 2015


   SUSE Security Update: Security update for curl
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:0179-1
Rating:             moderate
References:         #870444 #884698 #885302 #894575 #897816 #901924 
                    #911363 
Cross-References:   CVE-2014-3613 CVE-2014-3707 CVE-2014-8150
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Server 11 SP3 for VMware
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Security Module 11 SP3
                    SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________

   An update that solves three vulnerabilities and has four
   fixes is now available.

Description:


   This update fixes the following security issues:

       *

         CVE-2014-8150: URL request injection (bnc#911363)

         When libcurl sends a request to a server via a HTTP proxy, it copies
   the entire URL into the request and sends if off.

         If the given URL contains line feeds and carriage returns those will
   be sent along to the proxy too, which allows the program to for example
   send a separate HTTP request injected embedded in the URL.

       *

         CVE-2014-3707: duphandle read out of bounds (bnc#901924)

       *

         CVE-2014-3613: libcurl cookie leaks (bnc#894575)

   Additional bug fixed:

       * curl_multi_remove_handle: don't crash on multiple removes
         (bnc#897816)

   Security Issues:

       * CVE-2014-8150
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150>
       * CVE-2014-3613
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613>
       * CVE-2014-3707
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707>


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-curl-201501-10166

   - SUSE Linux Enterprise Server 11 SP3 for VMware:

      zypper in -t patch slessp3-curl-201501-10166

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-curl-201501-10166

   - SUSE Linux Enterprise Security Module 11 SP3:

      zypper in -t patch secsp3-curl-201501-10166

   - SUSE Linux Enterprise Desktop 11 SP3:

      zypper in -t patch sledsp3-curl-201501-10166

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      libcurl-devel-7.19.7-1.40.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

      curl-7.19.7-1.40.1
      libcurl4-7.19.7-1.40.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):

      libcurl4-32bit-7.19.7-1.40.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      curl-7.19.7-1.40.1
      libcurl4-7.19.7-1.40.1

   - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):

      libcurl4-32bit-7.19.7-1.40.1

   - SUSE Linux Enterprise Server 11 SP3 (ia64):

      libcurl4-x86-7.19.7-1.40.1

   - SUSE Linux Enterprise Security Module 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      libcurl4-openssl1-7.19.7-0.40.1

   - SUSE Linux Enterprise Security Module 11 SP3 (ppc64 s390x x86_64):

      libcurl4-openssl1-32bit-7.19.7-0.40.1

   - SUSE Linux Enterprise Security Module 11 SP3 (ia64):

      libcurl4-openssl1-x86-7.19.7-0.40.1

   - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):

      curl-7.19.7-1.40.1
      libcurl4-7.19.7-1.40.1

   - SUSE Linux Enterprise Desktop 11 SP3 (x86_64):

      libcurl4-32bit-7.19.7-1.40.1


References:

   http://support.novell.com/security/cve/CVE-2014-3613.html
   http://support.novell.com/security/cve/CVE-2014-3707.html
   http://support.novell.com/security/cve/CVE-2014-8150.html
   https://bugzilla.suse.com/show_bug.cgi?id=870444
   https://bugzilla.suse.com/show_bug.cgi?id=884698
   https://bugzilla.suse.com/show_bug.cgi?id=885302
   https://bugzilla.suse.com/show_bug.cgi?id=894575
   https://bugzilla.suse.com/show_bug.cgi?id=897816
   https://bugzilla.suse.com/show_bug.cgi?id=901924
   https://bugzilla.suse.com/show_bug.cgi?id=911363
   http://download.suse.com/patch/finder/?keywords=058c7ca165aac16861c50a9159fc2d64



More information about the sle-updates mailing list