You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa curl

Sigurnosni nedostaci programskog paketa curl

  • Detalji os-a: FED
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-6712
2015-04-23 11:30:46
——————————————————————————–

Name : curl
Product : Fedora 20
Version : 7.32.0
Release : 20.fc20
URL : http://curl.haxx.se/
Summary : A utility for getting files from remote servers (FTP, HTTP, and others)
Description :
curl is a command line tool for transferring data with URL syntax, supporting
FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,
SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP
uploading, HTTP form based upload, proxies, cookies, user+password
authentication (Basic, Digest, NTLM, Negotiate, kerberos…), file transfer
resume, proxy tunneling and a busload of other useful tricks.

——————————————————————————–
Update Information:

– require credentials to match for NTLM re-use (CVE-2015-3143)
– fix invalid write in cookie path sanitization code (CVE-2015-3145)
– close Negotiate connections when done (CVE-2015-3148)
——————————————————————————–
ChangeLog:

* Wed Apr 22 2015 Kamil Dudka <kdudka@redhat.com> 7.32.0-20
– require credentials to match for NTLM re-use (CVE-2015-3143)
– fix invalid write in cookie path sanitization code (CVE-2015-3145)
– close Negotiate connections when done (CVE-2015-3148)
* Mon Feb 23 2015 Kamil Dudka <kdudka@redhat.com> 7.32.0-19
– make ConnectionExists() re-use connections better (#1194603)
* Thu Jan 8 2015 Kamil Dudka <kdudka@redhat.com> 7.32.0-18
– reject CRLFs in URLs passed to proxy (CVE-2014-8150)
* Wed Dec 10 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-17
– make CURLOPT_LOW_SPEED_LIMIT work again with threaded resolver (#1172572)
* Mon Nov 24 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-16
– allow to use TLS 1.1 and TLS 1.2 (#1153814)
– disable libcurl-level downgrade to SSLv3 (#1166567)
– low-speed-limit: avoid timeout flood (#1166239)
* Wed Nov 5 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-15
– fix handling of CURLOPT_COPYPOSTFIELDS in curl_easy_duphandle (CVE-2014-3707)
* Tue Oct 21 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-14
– fix a connection failure when FTPS handle is reused
* Wed Sep 10 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-13
– use only full matches for hosts used as IP address in cookies (CVE-2014-3613)
– reject incoming cookies set for top level domains (CVE-2014-3620)
* Wed Jul 30 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-12
– fix endless loop with GSSAPI proxy auth (patches by David Woodhouse, #1118751)
* Mon Jun 2 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-11
– acknowledge the –no-sessionid/CURLOPT_SSL_SESSIONID_CACHE option (#1098711)
* Sat May 10 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-10
– extend URL parser to support IPv6 zone identifiers (#680996)
– auth failure on duplicated ‘WWW-Authenticate: Negotiate’ header (#1093348)
* Fri Apr 25 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-9
– nss: implement non-blocking SSL handshake
* Wed Mar 26 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-8
– fix connection re-use when using different log-in credentials (CVE-2014-0138)
* Mon Mar 17 2014 Paul Howarth <paul@city-fan.org> 7.32.0-7
– add all perl build requirements for the test suite, in a portable way
* Wed Mar 5 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-6
– avoid spurious failure of test1086 on s390(x) koji builders (#1072273)
* Tue Feb 25 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-5
– refresh expired cookie in test172 from upstream test-suite (#1068967)
– use proxy name in error messages when proxy is used (#1066484)
* Fri Jan 31 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-4
– re-use of wrong HTTP NTLM connection in libcurl (CVE-2014-0015)
——————————————————————————–
References:

[ 1 ] Bug #1213351 – CVE-2015-3148 curl: Negotiate not treated as connection-oriented
https://bugzilla.redhat.com/show_bug.cgi?id=1213351
[ 2 ] Bug #1213306 – CVE-2015-3143 curl: re-using authenticated connection when unauthenticated
https://bugzilla.redhat.com/show_bug.cgi?id=1213306
[ 3 ] Bug #1213347 – CVE-2015-3145 curl: cookie parser out of boundary memory access
https://bugzilla.redhat.com/show_bug.cgi?id=1213347
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update curl’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorTomislav Protega
Cert idNCERT-REF-2015-04-0005-ADV
CveCVE-2015-3143 CVE-2015-3145 CVE-2015-3148 CVE-2014-8150 CVE-2014-3707 CVE-2014-3613 CVE-2014-3620 CVE-2014-0138 CVE-2014-0015
ID izvornikaFEDORA-2015-6712
Proizvodcurl
Izvorhttp://www.redhat.com
Top
More in Preporuke
Ranjivost programskih paketa firefox i xulrunner

Otkrivena je ranjvost u funkciji "AsyncPaintWaitEvent::AsyncPaintWaitEvent" u Mozilli Firefox, a udaljenim napadačima može omogućiti izvršavanje proizvoljnog programskog koda ili rušenje...

Close