Login
Newsletter
Werbung

Sicherheit: Preisgabe von Informationen in curl
Aktuelle Meldungen Distributionen
Name: Preisgabe von Informationen in curl
ID: FEDORA-2013-7813
Distribution: Fedora
Plattformen: Fedora 18
Datum: Mi, 15. Mai 2013, 08:47
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944
Applikationen: curl

Originalnachricht

Name        : curl
Product : Fedora 18
Version : 7.27.0
Release : 10.fc18
URL : http://curl.haxx.se/
Summary : A utility for getting files from remote servers (FTP, HTTP, and
others)
Description :
curl is a command line tool for transferring data with URL syntax, supporting
FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,
SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP
uploading, HTTP form based upload, proxies, cookies, user+password
authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer
resume, proxy tunneling and a busload of other useful tricks.

-------------------------------------------------------------------------------
-
Update Information:

switch SSL socket into non-blocking mode after handshake (#960765)
- prevent an artificial timeout event due to stale speed-check data (#906031)
- show proper host name on failed resolve (#957173)
fix cookie tailmatching to prevent cross-domain leakage (CVE-2013-1944)
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu May 9 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-10
- switch SSL socket into non-blocking mode after handshake (#960765)
* Fri Apr 26 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-9
- prevent an artificial timeout event due to stale speed-check data (#906031)
- show proper host name on failed resolve (#957173)
* Fri Apr 12 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-8
- fix cookie tailmatching to prevent cross-domain leakage (CVE-2013-1944)
* Tue Mar 12 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-7
- curl_global_init() now accepts the CURL_GLOBAL_ACK_EINTR flag (#919127)
* Wed Feb 6 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-6
- fix buffer overflow when negotiating SASL DIGEST-MD5 auth (CVE-2013-0249)
* Tue Jan 15 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-5
- do not print misleading NSS error codes
- update the links to cipher-suites supported by NSS
- prevent NSS from crashing on client auth hook failure
- clear session cache if a client cert from file is used
- fix error messages for CURLE_SSL_{CACERT,CRL}_BADFILE
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #950577 - CVE-2013-1944 curl: Cookie domain suffix match
vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=950577
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update curl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung