Security update for curl
| Announcement ID: | SUSE-SU-2016:2714-1 | 
|---|---|
| Rating: | important | 
| References: | |
| Cross-References: | |
| CVSS scores: | 
                    
  | 
            
| Affected Products: | 
                
  | 
        
An update that solves 11 vulnerabilities can now be installed.
Description:
This update for curl fixes the following security issues:
- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
 - CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
 - CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
 - CVE-2016-8619: double-free in krb5 code (bsc#1005638)
 - CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
 - CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
 - CVE-2016-8616: case insensitive password comparison (bsc#1005634)
 - CVE-2016-8615: cookie injection for other servers (bsc#1005633)
 - CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
 
Patch Instructions:
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".
        Alternatively you can run the command listed for your product:
    
- 
                SUSE Linux Enterprise Software Development Kit 11 SP4
                
                    
                        
zypper in -t patch sdksp4-curl-12831=1 - 
                Security Module for SUSE Linux Enterprise 11 11-SP3
                
                    
                        
zypper in -t patch secsp3-curl-12831=1 - 
                SUSE Linux Enterprise Server 11 SP4
                
                    
                        
zypper in -t patch slessp4-curl-12831=1 - 
                SLES for SAP Applications 11-SP4
                
                    
                        
zypper in -t patch slessp4-curl-12831=1 
Package List:
- 
                    SUSE Linux Enterprise Software Development Kit 11 SP4 (s390x x86_64 i586 ppc64 ia64)
                    
- libcurl-devel-7.19.7-1.64.1
 
 - 
                    Security Module for SUSE Linux Enterprise 11 11-SP3 (s390x x86_64 i586 ppc64 ia64)
                    
- libcurl4-openssl1-7.19.7-1.64.1
 - curl-openssl1-7.19.7-1.64.1
 
 - 
                    Security Module for SUSE Linux Enterprise 11 11-SP3 (ia64)
                    
- libcurl4-openssl1-x86-7.19.7-1.64.1
 
 - 
                    Security Module for SUSE Linux Enterprise 11 11-SP3 (ppc64 s390x x86_64)
                    
- libcurl4-openssl1-32bit-7.19.7-1.64.1
 
 - 
                    SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
                    
- libcurl4-7.19.7-1.64.1
 - curl-7.19.7-1.64.1
 
 - 
                    SUSE Linux Enterprise Server 11 SP4 (ia64)
                    
- libcurl4-x86-7.19.7-1.64.1
 
 - 
                    SUSE Linux Enterprise Server 11 SP4 (ppc64 s390x x86_64)
                    
- libcurl4-32bit-7.19.7-1.64.1
 
 - 
                    SLES for SAP Applications 11-SP4 (ppc64 x86_64)
                    
- libcurl4-7.19.7-1.64.1
 - curl-7.19.7-1.64.1
 - libcurl4-32bit-7.19.7-1.64.1
 
 
References:
- https://www.suse.com/security/cve/CVE-2016-7167.html
 - https://www.suse.com/security/cve/CVE-2016-8615.html
 - https://www.suse.com/security/cve/CVE-2016-8616.html
 - https://www.suse.com/security/cve/CVE-2016-8617.html
 - https://www.suse.com/security/cve/CVE-2016-8618.html
 - https://www.suse.com/security/cve/CVE-2016-8619.html
 - https://www.suse.com/security/cve/CVE-2016-8620.html
 - https://www.suse.com/security/cve/CVE-2016-8621.html
 - https://www.suse.com/security/cve/CVE-2016-8622.html
 - https://www.suse.com/security/cve/CVE-2016-8623.html
 - https://www.suse.com/security/cve/CVE-2016-8624.html
 - https://bugzilla.suse.com/show_bug.cgi?id=1005633
 - https://bugzilla.suse.com/show_bug.cgi?id=1005634
 - https://bugzilla.suse.com/show_bug.cgi?id=1005635
 - https://bugzilla.suse.com/show_bug.cgi?id=1005637
 - https://bugzilla.suse.com/show_bug.cgi?id=1005638
 - https://bugzilla.suse.com/show_bug.cgi?id=1005642
 - https://bugzilla.suse.com/show_bug.cgi?id=1005645
 - https://bugzilla.suse.com/show_bug.cgi?id=1005646
 - https://bugzilla.suse.com/show_bug.cgi?id=998760