Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in curl
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in curl
ID: FEDORA-2013-11568
Distribution: Fedora
Plattformen: Fedora 17
Datum: Di, 23. Juli 2013, 13:50
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
Applikationen: curl

Originalnachricht

Name        : curl
Product : Fedora 17
Version : 7.24.0
Release : 10.fc17
URL : http://curl.haxx.se/
Summary : A utility for getting files from remote servers (FTP, HTTP, and
others)
Description :
curl is a command line tool for transferring data with URL syntax, supporting
FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,
SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP
uploading, HTTP form based upload, proxies, cookies, user+password
authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer
resume, proxy tunneling and a busload of other useful tricks.

-------------------------------------------------------------------------------
-
Update Information:

CVE-2013-2174 - fix heap-based buffer overflow in curl_easy_unescape()
-------------------------------------------------------------------------------
-
ChangeLog:

* Sat Jun 22 2013 Kamil Dudka <kdudka@redhat.com> 7.24.0-10
- fix heap-based buffer overflow in curl_easy_unescape() (CVE-2013-2174)
* Thu May 9 2013 Kamil Dudka <kdudka@redhat.com> 7.24.0-9
- switch SSL socket into non-blocking mode after handshake (#960765)
* Fri Apr 26 2013 Kamil Dudka <kdudka@redhat.com> 7.24.0-8
- prevent an artificial timeout event due to stale speed-check data (#906031)
- show proper host name on failed resolve (#957173)
* Fri Apr 12 2013 Kamil Dudka <kdudka@redhat.com> 7.24.0-7
- fix cookie tailmatching to prevent cross-domain leakage (CVE-2013-1944)
* Tue Mar 12 2013 Kamil Dudka <kdudka@redhat.com> 7.24.0-6
- curl_global_init() now accepts the CURL_GLOBAL_ACK_EINTR flag (#919127)
* Wed Aug 1 2012 Kamil Dudka <kdudka@redhat.com> 7.24.0-5
- use human-readable error messages provided by NSS (upstream commit 72f4b534)
- print reason phrase from HTTP status line on error (#676596)
- eliminate unnecessary inotify events on upload via file protocol (#844385)
* Sat Jun 9 2012 Kamil Dudka <kdudka@redhat.com> 7.24.0-4
- fix duplicated SSL handshake with multi interface and proxy (#788526)
* Mon May 21 2012 Kamil Dudka <kdudka@redhat.com> 7.24.0-3
- do not use valgrind on ppc (#810992)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #965640 - CVE-2013-2174 curl: Loop counter error, leading to
heap-based buffer overflow when decoding certain URLs
https://bugzilla.redhat.com/show_bug.cgi?id=965640
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update curl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung