You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa curl

Sigurnosni nedostaci programskog paketa curl

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-6728
2015-04-23 11:32:18
——————————————————————————–

Name : curl
Product : Fedora 21
Version : 7.37.0
Release : 14.fc21
URL : http://curl.haxx.se/
Summary : A utility for getting files from remote servers (FTP, HTTP, and others)
Description :
curl is a command line tool for transferring data with URL syntax, supporting
FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,
SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP
uploading, HTTP form based upload, proxies, cookies, user+password
authentication (Basic, Digest, NTLM, Negotiate, kerberos…), file transfer
resume, proxy tunneling and a busload of other useful tricks.

——————————————————————————–
Update Information:

– require credentials to match for NTLM re-use (CVE-2015-3143)
– fix invalid write with a zero-length host name in URL (CVE-2015-3144)
– fix invalid write in cookie path sanitization code (CVE-2015-3145)
– close Negotiate connections when done (CVE-2015-3148)
——————————————————————————–
ChangeLog:

* Wed Apr 22 2015 Kamil Dudka <kdudka@redhat.com> 7.37.0-14
– require credentials to match for NTLM re-use (CVE-2015-3143)
– fix invalid write with a zero-length host name in URL (CVE-2015-3144)
– fix invalid write in cookie path sanitization code (CVE-2015-3145)
– close Negotiate connections when done (CVE-2015-3148)
* Mon Feb 23 2015 Kamil Dudka <kdudka@redhat.com> 7.37.0-13
– fix a spurious connect failure on dual-stacked hosts (#1187531)
* Thu Jan 8 2015 Kamil Dudka <kdudka@redhat.com> 7.37.0-12
– reject CRLFs in URLs passed to proxy (CVE-2014-8150)
* Wed Dec 10 2014 Kamil Dudka <kdudka@redhat.com> 7.37.0-11
– make CURLOPT_LOW_SPEED_LIMIT work again with threaded-resolver (#1172572)
* Fri Nov 21 2014 Kamil Dudka <kdudka@redhat.com> 7.37.0-10
– disable libcurl-level downgrade to SSLv3 (#1166567)
– low-speed-limit: avoid timeout flood (#1166239)
——————————————————————————–
References:

[ 1 ] Bug #1213351 – CVE-2015-3148 curl: Negotiate not treated as connection-oriented
https://bugzilla.redhat.com/show_bug.cgi?id=1213351
[ 2 ] Bug #1213306 – CVE-2015-3143 curl: re-using authenticated connection when unauthenticated
https://bugzilla.redhat.com/show_bug.cgi?id=1213306
[ 3 ] Bug #1213335 – CVE-2015-3144 curl: host name out of boundary memory access
https://bugzilla.redhat.com/show_bug.cgi?id=1213335
[ 4 ] Bug #1213347 – CVE-2015-3145 curl: cookie parser out of boundary memory access
https://bugzilla.redhat.com/show_bug.cgi?id=1213347
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update curl’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2015-05-0019-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivosti programskog paketa DirectFB

Otkrivene su dvije ranjivosti u datoteci proxy/dispatcher/idirectfbsurface_dispatcher.c unutar DirectFB-a za openSUSE 13.1 i 13.2. Ranjivosti udaljenim napadačima omogućuju rušenje servisa...

Close