Name : curl Product : Fedora 18 Version : 7.27.0 Release : 11.fc18 URL : http://curl.haxx.se/ Summary : A utility for getting files from remote servers (FTP, HTTP, and others) Description : curl is a command line tool for transferring data with URL syntax, supporting FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP form based upload, proxies, cookies, user+password authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer resume, proxy tunneling and a busload of other useful tricks.
------------------------------------------------------------------------------- - Update Information:
CVE-2013-2174 - fix heap-based buffer overflow in curl_easy_unescape() ------------------------------------------------------------------------------- - ChangeLog:
* Sat Jun 22 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-11 - fix heap-based buffer overflow in curl_easy_unescape() (CVE-2013-2174) * Thu May 9 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-10 - switch SSL socket into non-blocking mode after handshake (#960765) * Fri Apr 26 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-9 - prevent an artificial timeout event due to stale speed-check data (#906031) - show proper host name on failed resolve (#957173) * Fri Apr 12 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-8 - fix cookie tailmatching to prevent cross-domain leakage (CVE-2013-1944) * Tue Mar 12 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-7 - curl_global_init() now accepts the CURL_GLOBAL_ACK_EINTR flag (#919127) * Wed Feb 6 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-6 - fix buffer overflow when negotiating SASL DIGEST-MD5 auth (CVE-2013-0249) * Tue Jan 15 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-5 - do not print misleading NSS error codes - update the links to cipher-suites supported by NSS - prevent NSS from crashing on client auth hook failure - clear session cache if a client cert from file is used - fix error messages for CURLE_SSL_{CACERT,CRL}_BADFILE ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #965640 - CVE-2013-2174 curl: Loop counter error, leading to heap-based buffer overflow when decoding certain URLs https://bugzilla.redhat.com/show_bug.cgi?id=965640 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update curl' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|