Fixing curl URL sanitizing vulnerability and SSL weakness

The following vulnerabilities have been fixed in curl:

- IMAP, POP3 and SMTP URL sanitization vulnerability
(CVE-2012-0036)
- disable SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS (CVE-2011-3389)
- disable SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG option
for older openssl versions (CVE-2010-4180)

Fixed bugs
bnc#740452
VUL-0: curl: URL sanitizing vulnerability
bnc#742306
VUL-0: curl sets SSL_OP_ALL
CVE#CVE-2012-0036
curl and libcurl 7.2x before 7.24.0 do not properly consider special characters during extraction of a pathname from a URL, which allows remote attackers to conduct data-injection attacks via a crafted URL, as demonstrated by a CRLF injection attack on th
CVE#CVE-2011-3389
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-t
CVE#CVE-2010-4180
OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended
Selected Binaries
openSUSE Build Service is sponsored by