openSUSE Security Update: Fixing curl URL sanitizing vulnerability and SSL weakness ______________________________________________________________________________ Announcement ID: openSUSE-SU-2012:0229-1 Rating: moderate References: #740452 #742306 Cross-References: CVE-2010-4180 CVE-2011-3389 CVE-2012-0036 Affected Products: openSUSE 11.4 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: The following vulnerabilities have been fixed in curl: - IMAP, POP3 and SMTP URL sanitization vulnerability (CVE-2012-0036) - disable SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS (CVE-2011-3389) - disable SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG option for older openssl versions (CVE-2010-4180) Special Instructions and Notes: Please reboot the system after installing this update.This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch curl-5702 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.4 (i586 x86_64): curl-7.21.2-10.11.1 libcurl-devel-7.21.2-10.11.1 libcurl4-7.21.2-10.11.1 - openSUSE 11.4 (x86_64): libcurl4-32bit-7.21.2-10.11.1 References: http://support.novell.com/security/cve/CVE-2010-4180.html http://support.novell.com/security/cve/CVE-2011-3389.html http://support.novell.com/security/cve/CVE-2012-0036.html https://bugzilla.novell.com/740452 https://bugzilla.novell.com/742306