SUSE-SU-2017:1043-1: moderate: Security update for curl
    sle-updates at lists.suse.com 
    sle-updates at lists.suse.com
       
    Tue Apr 18 07:12:23 MDT 2017
    
    
  
   SUSE Security Update: Security update for curl
______________________________________________________________________________
Announcement ID:    SUSE-SU-2017:1043-1
Rating:             moderate
References:         #1015332 #1032309 
Cross-References:   CVE-2016-9586 CVE-2017-7407
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Server 11-SECURITY
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
   An update that fixes two vulnerabilities is now available.
Description:
   This update for curl fixes the following issues:
   These security issues were fixed:
   - CVE-2016-9586: libcurl printf floating point buffer overflow
     (bsc#1015332)
   - CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might
     have allowed physically proximate attackers to obtain sensitive
     information from process memory in opportunistic circumstances by
     reading a workstation screen during use of a --write-out argument ending
     in a '%' character, which lead to a heap-based buffer over-read
     (bsc#1032309).
Patch Instructions:
   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:
   - SUSE Linux Enterprise Software Development Kit 11-SP4:
      zypper in -t patch sdksp4-curl-13065=1
   - SUSE Linux Enterprise Server 11-SP4:
      zypper in -t patch slessp4-curl-13065=1
   - SUSE Linux Enterprise Server 11-SECURITY:
      zypper in -t patch secsp3-curl-13065=1
   - SUSE Linux Enterprise Debuginfo 11-SP4:
      zypper in -t patch dbgsp4-curl-13065=1
   To bring your system up-to-date, use "zypper patch".
Package List:
   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      libcurl-devel-7.19.7-1.69.1
   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      curl-7.19.7-1.69.1
      libcurl4-7.19.7-1.69.1
   - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):
      libcurl4-32bit-7.19.7-1.69.1
   - SUSE Linux Enterprise Server 11-SP4 (ia64):
      libcurl4-x86-7.19.7-1.69.1
   - SUSE Linux Enterprise Server 11-SECURITY (i586 ia64 ppc64 s390x x86_64):
      curl-openssl1-7.19.7-1.69.1
      libcurl4-openssl1-7.19.7-1.69.1
   - SUSE Linux Enterprise Server 11-SECURITY (ppc64 s390x x86_64):
      libcurl4-openssl1-32bit-7.19.7-1.69.1
   - SUSE Linux Enterprise Server 11-SECURITY (ia64):
      libcurl4-openssl1-x86-7.19.7-1.69.1
   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      curl-debuginfo-7.19.7-1.69.1
      curl-debugsource-7.19.7-1.69.1
References:
   https://www.suse.com/security/cve/CVE-2016-9586.html
   https://www.suse.com/security/cve/CVE-2017-7407.html
   https://bugzilla.suse.com/1015332
   https://bugzilla.suse.com/1032309
    
    
More information about the sle-updates
mailing list