Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in curl
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in curl
ID: FEDORA-2013-11574
Distribution: Fedora
Plattformen: Fedora 18
Datum: Sa, 13. Juli 2013, 12:36
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
Applikationen: curl

Originalnachricht

Name        : curl
Product : Fedora 18
Version : 7.27.0
Release : 11.fc18
URL : http://curl.haxx.se/
Summary : A utility for getting files from remote servers (FTP, HTTP, and
others)
Description :
curl is a command line tool for transferring data with URL syntax, supporting
FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,
SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP
uploading, HTTP form based upload, proxies, cookies, user+password
authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer
resume, proxy tunneling and a busload of other useful tricks.

-------------------------------------------------------------------------------
-
Update Information:

CVE-2013-2174 - fix heap-based buffer overflow in curl_easy_unescape()
-------------------------------------------------------------------------------
-
ChangeLog:

* Sat Jun 22 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-11
- fix heap-based buffer overflow in curl_easy_unescape() (CVE-2013-2174)
* Thu May 9 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-10
- switch SSL socket into non-blocking mode after handshake (#960765)
* Fri Apr 26 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-9
- prevent an artificial timeout event due to stale speed-check data (#906031)
- show proper host name on failed resolve (#957173)
* Fri Apr 12 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-8
- fix cookie tailmatching to prevent cross-domain leakage (CVE-2013-1944)
* Tue Mar 12 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-7
- curl_global_init() now accepts the CURL_GLOBAL_ACK_EINTR flag (#919127)
* Wed Feb 6 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-6
- fix buffer overflow when negotiating SASL DIGEST-MD5 auth (CVE-2013-0249)
* Tue Jan 15 2013 Kamil Dudka <kdudka@redhat.com> 7.27.0-5
- do not print misleading NSS error codes
- update the links to cipher-suites supported by NSS
- prevent NSS from crashing on client auth hook failure
- clear session cache if a client cert from file is used
- fix error messages for CURLE_SSL_{CACERT,CRL}_BADFILE
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #965640 - CVE-2013-2174 curl: Loop counter error, leading to
heap-based buffer overflow when decoding certain URLs
https://bugzilla.redhat.com/show_bug.cgi?id=965640
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update curl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung