-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2398-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff January 30, 2012 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : curl Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2011-3389 CVE-2012-0036 Several vulnerabilities have been discovered in Curl, an URL transfer library. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2011-3389 This update enables OpenSSL workarounds against the "BEAST" attack. Additional information can be found in the Curl advisory: http://curl.haxx.se/docs/adv_20120124B.html CVE-2012-0036 Dan Fandrich discovered that Curl performs insufficient sanitising when extracting the file path part of an URL. For the oldstable distribution (lenny), this problem has been fixed in version 7.18.2-8lenny6. For the stable distribution (squeeze), this problem has been fixed in version 7.21.0-2.1+squeeze1. For the unstable distribution (sid), this problem has been fixed in version 7.24.0-1. We recommend that you upgrade your curl packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iEYEARECAAYFAk8m8/EACgkQXm3vHE4uylpUOwCeKPn+RnVyLB82PNxYhxlVk1B7 Kk0Anj7/2ja+Hp/861Xfz7C+ootCG0Us =dvXX -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/