Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in curl
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in curl
ID: SSA:2021-202-02
Distribution: Slackware
Plattformen: Slackware -current, Slackware x86_64 -current, Slackware 14.0, Slackware x86_64 14.0, Slackware 14.1, Slackware x86_64 14.1, Slackware 14.2, Slackware x86_64 14.2
Datum: Mi, 21. Juli 2021, 22:49
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922
Applikationen: curl

Originalnachricht


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] curl (SSA:2021-202-02)

New curl packages are available for Slackware 14.0, 14.1, 14.2, and -current to
fix security issues.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/curl-7.78.0-i586-1_slack14.2.txz: Upgraded.
This update fixes security issues:
CURLOPT_SSLCERT mixup with Secure Transport
TELNET stack contents disclosure again
Bad connection reuse due to flawed path name checks
Metalink download sends credentials
Wrong content via metalink not discarded
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.0:
curl-7.78.0-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
curl-7.78.0-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
curl-7.78.0-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
curl-7.78.0-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
curl-7.78.0-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
curl-7.78.0-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
curl-7.78.0-i586-1.txz

Updated package for Slackware x86_64 -current:
curl-7.78.0-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 14.0 package:
36c0577e4fb5ec3916ca08723c02745d curl-7.78.0-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
89bdac9fbe9219ff4feb03a2c879bea9 curl-7.78.0-x86_64-1_slack14.0.txz

Slackware 14.1 package:
b5fbcd000bf09c0a46d1ad6ff369f91a curl-7.78.0-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
53d76579584b6ede3487d7f7eb915ba9 curl-7.78.0-x86_64-1_slack14.1.txz

Slackware 14.2 package:
91be99e064eda0e0f6099495ba21117d curl-7.78.0-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
c99a8249e4b1b37dc01c17545d6346e3 curl-7.78.0-x86_64-1_slack14.2.txz

Slackware -current package:
305305032335ed9455dd253f331b43f7 n/curl-7.78.0-i586-1.txz

Slackware x86_64 -current package:
0cb3ee1ff68eac68483d529146a28b23 n/curl-7.78.0-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg curl-7.78.0-i586-1_slack14.2.txz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAmD4ZHEACgkQakRjwEAQIjO7iwCfUedHUtrtf5P4EdB+tO7A+WED
g2wAnROp3XNZtz7fQLbSDOe8P5dpO+62
=iT2r
-----END PGP SIGNATURE-----
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung