openSUSE Security Update: Fixing curl URL sanitizing vulnerability and SSL weakness ______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0229-1 Rating: moderate References: #740452 #742306 Cross-References: CVE-2010-4180 CVE-2011-3389 CVE-2012-0036
Affected Products: openSUSE 11.4 ______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
The following vulnerabilities have been fixed in curl:
- IMAP, POP3 and SMTP URL sanitization vulnerability (CVE-2012-0036) - disable SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS (CVE-2011-3389) - disable SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG option for older openssl versions (CVE-2010-4180)
Special Instructions and Notes:
Please reboot the system after installing this update.This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch curl-5702
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
curl-7.21.2-10.11.1 libcurl-devel-7.21.2-10.11.1 libcurl4-7.21.2-10.11.1
- openSUSE 11.4 (x86_64):
libcurl4-32bit-7.21.2-10.11.1
References:
http://support.novell.com/security/cve/CVE-2010-4180.html http://support.novell.com/security/cve/CVE-2011-3389.html http://support.novell.com/security/cve/CVE-2012-0036.html https://bugzilla.novell.com/740452 https://bugzilla.novell.com/742306