[SECURITY] Fedora 20 Update: curl-7.32.0-18.fc20

updates at fedoraproject.org updates at fedoraproject.org
Sat Jan 10 11:56:13 UTC 2015


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2015-0418
2015-01-08 22:34:25
--------------------------------------------------------------------------------

Name        : curl
Product     : Fedora 20
Version     : 7.32.0
Release     : 18.fc20
URL         : http://curl.haxx.se/
Summary     : A utility for getting files from remote servers (FTP, HTTP, and others)
Description :
curl is a command line tool for transferring data with URL syntax, supporting
FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,
SMTP, POP3 and RTSP.  curl supports SSL certificates, HTTP POST, HTTP PUT, FTP
uploading, HTTP form based upload, proxies, cookies, user+password
authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer
resume, proxy tunneling and a busload of other useful tricks.

--------------------------------------------------------------------------------
Update Information:

- reject CRLFs in URLs passed to proxy (CVE-2014-8150)
--------------------------------------------------------------------------------
ChangeLog:

* Thu Jan  8 2015 Kamil Dudka <kdudka at redhat.com> 7.32.0-18
- reject CRLFs in URLs passed to proxy (CVE-2014-8150)
* Wed Dec 10 2014 Kamil Dudka <kdudka at redhat.com> 7.32.0-17
- make CURLOPT_LOW_SPEED_LIMIT work again with threaded resolver (#1172572)
* Mon Nov 24 2014 Kamil Dudka <kdudka at redhat.com> 7.32.0-16
- allow to use TLS 1.1 and TLS 1.2 (#1153814)
- disable libcurl-level downgrade to SSLv3 (#1166567)
- low-speed-limit: avoid timeout flood (#1166239)
* Wed Nov  5 2014 Kamil Dudka <kdudka at redhat.com> 7.32.0-15
- fix handling of CURLOPT_COPYPOSTFIELDS in curl_easy_duphandle (CVE-2014-3707)
* Tue Oct 21 2014 Kamil Dudka <kdudka at redhat.com> 7.32.0-14
- fix a connection failure when FTPS handle is reused
* Wed Sep 10 2014 Kamil Dudka <kdudka at redhat.com> 7.32.0-13
- use only full matches for hosts used as IP address in cookies (CVE-2014-3613)
- reject incoming cookies set for top level domains (CVE-2014-3620)
* Wed Jul 30 2014 Kamil Dudka <kdudka at redhat.com> 7.32.0-12
- fix endless loop with GSSAPI proxy auth (patches by David Woodhouse, #1118751)
* Mon Jun  2 2014 Kamil Dudka <kdudka at redhat.com> 7.32.0-11
- acknowledge the --no-sessionid/CURLOPT_SSL_SESSIONID_CACHE option (#1098711)
* Sat May 10 2014 Kamil Dudka <kdudka at redhat.com> 7.32.0-10
- extend URL parser to support IPv6 zone identifiers (#680996)
- auth failure on duplicated 'WWW-Authenticate: Negotiate' header (#1093348)
* Fri Apr 25 2014 Kamil Dudka <kdudka at redhat.com> 7.32.0-9
- nss: implement non-blocking SSL handshake
* Wed Mar 26 2014 Kamil Dudka <kdudka at redhat.com> 7.32.0-8
- fix connection re-use when using different log-in credentials (CVE-2014-0138)
* Mon Mar 17 2014 Paul Howarth <paul at city-fan.org> 7.32.0-7
- add all perl build requirements for the test suite, in a portable way
* Wed Mar  5 2014 Kamil Dudka <kdudka at redhat.com> 7.32.0-6
- avoid spurious failure of test1086 on s390(x) koji builders (#1072273)
* Tue Feb 25 2014 Kamil Dudka <kdudka at redhat.com> 7.32.0-5
- refresh expired cookie in test172 from upstream test-suite (#1068967)
- use proxy name in error messages when proxy is used (#1066484)
* Fri Jan 31 2014 Kamil Dudka <kdudka at redhat.com> 7.32.0-4
- re-use of wrong HTTP NTLM connection in libcurl (CVE-2014-0015)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1178692 - CVE-2014-8150 curl: URL request injection vulnerability in parseurlandfillconn()
        https://bugzilla.redhat.com/show_bug.cgi?id=1178692
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update curl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list