Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in curl
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in curl
ID: FEDORA-2015-0418
Distribution: Fedora
Plattformen: Fedora 20
Datum: Sa, 10. Januar 2015, 19:35
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150
Applikationen: curl

Originalnachricht

Name        : curl
Product : Fedora 20
Version : 7.32.0
Release : 18.fc20
URL : http://curl.haxx.se/
Summary : A utility for getting files from remote servers (FTP, HTTP, and
others)
Description :
curl is a command line tool for transferring data with URL syntax, supporting
FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,
SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP
uploading, HTTP form based upload, proxies, cookies, user+password
authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer
resume, proxy tunneling and a busload of other useful tricks.

-------------------------------------------------------------------------------
-
Update Information:

- reject CRLFs in URLs passed to proxy (CVE-2014-8150)
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu Jan 8 2015 Kamil Dudka <kdudka@redhat.com> 7.32.0-18
- reject CRLFs in URLs passed to proxy (CVE-2014-8150)
* Wed Dec 10 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-17
- make CURLOPT_LOW_SPEED_LIMIT work again with threaded resolver (#1172572)
* Mon Nov 24 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-16
- allow to use TLS 1.1 and TLS 1.2 (#1153814)
- disable libcurl-level downgrade to SSLv3 (#1166567)
- low-speed-limit: avoid timeout flood (#1166239)
* Wed Nov 5 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-15
- fix handling of CURLOPT_COPYPOSTFIELDS in curl_easy_duphandle (CVE-2014-3707)
* Tue Oct 21 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-14
- fix a connection failure when FTPS handle is reused
* Wed Sep 10 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-13
- use only full matches for hosts used as IP address in cookies (CVE-2014-3613)
- reject incoming cookies set for top level domains (CVE-2014-3620)
* Wed Jul 30 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-12
- fix endless loop with GSSAPI proxy auth (patches by David Woodhouse,
#1118751)
* Mon Jun 2 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-11
- acknowledge the --no-sessionid/CURLOPT_SSL_SESSIONID_CACHE option (#1098711)
* Sat May 10 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-10
- extend URL parser to support IPv6 zone identifiers (#680996)
- auth failure on duplicated 'WWW-Authenticate: Negotiate' header
(#1093348)
* Fri Apr 25 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-9
- nss: implement non-blocking SSL handshake
* Wed Mar 26 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-8
- fix connection re-use when using different log-in credentials (CVE-2014-0138)
* Mon Mar 17 2014 Paul Howarth <paul@city-fan.org> 7.32.0-7
- add all perl build requirements for the test suite, in a portable way
* Wed Mar 5 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-6
- avoid spurious failure of test1086 on s390(x) koji builders (#1072273)
* Tue Feb 25 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-5
- refresh expired cookie in test172 from upstream test-suite (#1068967)
- use proxy name in error messages when proxy is used (#1066484)
* Fri Jan 31 2014 Kamil Dudka <kdudka@redhat.com> 7.32.0-4
- re-use of wrong HTTP NTLM connection in libcurl (CVE-2014-0015)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1178692 - CVE-2014-8150 curl: URL request injection vulnerability
in parseurlandfillconn()
https://bugzilla.redhat.com/show_bug.cgi?id=1178692
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update curl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung