Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in curl
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in curl
ID: FEDORA-2015-6728
Distribution: Fedora
Plattformen: Fedora 21
Datum: Sa, 2. Mai 2015, 22:03
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148
Applikationen: curl

Originalnachricht

Name        : curl
Product : Fedora 21
Version : 7.37.0
Release : 14.fc21
URL : http://curl.haxx.se/
Summary : A utility for getting files from remote servers (FTP, HTTP, and
others)
Description :
curl is a command line tool for transferring data with URL syntax, supporting
FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,
SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP
uploading, HTTP form based upload, proxies, cookies, user+password
authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer
resume, proxy tunneling and a busload of other useful tricks.

-------------------------------------------------------------------------------
-
Update Information:

- require credentials to match for NTLM re-use (CVE-2015-3143)
- fix invalid write with a zero-length host name in URL (CVE-2015-3144)
- fix invalid write in cookie path sanitization code (CVE-2015-3145)
- close Negotiate connections when done (CVE-2015-3148)
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Apr 22 2015 Kamil Dudka <kdudka@redhat.com> 7.37.0-14
- require credentials to match for NTLM re-use (CVE-2015-3143)
- fix invalid write with a zero-length host name in URL (CVE-2015-3144)
- fix invalid write in cookie path sanitization code (CVE-2015-3145)
- close Negotiate connections when done (CVE-2015-3148)
* Mon Feb 23 2015 Kamil Dudka <kdudka@redhat.com> 7.37.0-13
- fix a spurious connect failure on dual-stacked hosts (#1187531)
* Thu Jan 8 2015 Kamil Dudka <kdudka@redhat.com> 7.37.0-12
- reject CRLFs in URLs passed to proxy (CVE-2014-8150)
* Wed Dec 10 2014 Kamil Dudka <kdudka@redhat.com> 7.37.0-11
- make CURLOPT_LOW_SPEED_LIMIT work again with threaded-resolver (#1172572)
* Fri Nov 21 2014 Kamil Dudka <kdudka@redhat.com> 7.37.0-10
- disable libcurl-level downgrade to SSLv3 (#1166567)
- low-speed-limit: avoid timeout flood (#1166239)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1213351 - CVE-2015-3148 curl: Negotiate not treated as
connection-oriented
https://bugzilla.redhat.com/show_bug.cgi?id=1213351
[ 2 ] Bug #1213306 - CVE-2015-3143 curl: re-using authenticated connection
when unauthenticated
https://bugzilla.redhat.com/show_bug.cgi?id=1213306
[ 3 ] Bug #1213335 - CVE-2015-3144 curl: host name out of boundary memory
access
https://bugzilla.redhat.com/show_bug.cgi?id=1213335
[ 4 ] Bug #1213347 - CVE-2015-3145 curl: cookie parser out of boundary memory
access
https://bugzilla.redhat.com/show_bug.cgi?id=1213347
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update curl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung