[SECURITY] Fedora 21 Update: curl-7.37.0-14.fc21

updates at fedoraproject.org updates at fedoraproject.org
Sat May 2 18:11:42 UTC 2015


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2015-6728
2015-04-23 11:32:18
--------------------------------------------------------------------------------

Name        : curl
Product     : Fedora 21
Version     : 7.37.0
Release     : 14.fc21
URL         : http://curl.haxx.se/
Summary     : A utility for getting files from remote servers (FTP, HTTP, and others)
Description :
curl is a command line tool for transferring data with URL syntax, supporting
FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,
SMTP, POP3 and RTSP.  curl supports SSL certificates, HTTP POST, HTTP PUT, FTP
uploading, HTTP form based upload, proxies, cookies, user+password
authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer
resume, proxy tunneling and a busload of other useful tricks.

--------------------------------------------------------------------------------
Update Information:

- require credentials to match for NTLM re-use (CVE-2015-3143)
- fix invalid write with a zero-length host name in URL (CVE-2015-3144)
- fix invalid write in cookie path sanitization code (CVE-2015-3145)
- close Negotiate connections when done (CVE-2015-3148)
--------------------------------------------------------------------------------
ChangeLog:

* Wed Apr 22 2015 Kamil Dudka <kdudka at redhat.com> 7.37.0-14
- require credentials to match for NTLM re-use (CVE-2015-3143)
- fix invalid write with a zero-length host name in URL (CVE-2015-3144)
- fix invalid write in cookie path sanitization code (CVE-2015-3145)
- close Negotiate connections when done (CVE-2015-3148)
* Mon Feb 23 2015 Kamil Dudka <kdudka at redhat.com> 7.37.0-13
- fix a spurious connect failure on dual-stacked hosts (#1187531)
* Thu Jan  8 2015 Kamil Dudka <kdudka at redhat.com> 7.37.0-12
- reject CRLFs in URLs passed to proxy (CVE-2014-8150)
* Wed Dec 10 2014 Kamil Dudka <kdudka at redhat.com> 7.37.0-11
- make CURLOPT_LOW_SPEED_LIMIT work again with threaded-resolver (#1172572)
* Fri Nov 21 2014 Kamil Dudka <kdudka at redhat.com> 7.37.0-10
- disable libcurl-level downgrade to SSLv3 (#1166567)
- low-speed-limit: avoid timeout flood (#1166239)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1213351 - CVE-2015-3148 curl: Negotiate not treated as connection-oriented
        https://bugzilla.redhat.com/show_bug.cgi?id=1213351
  [ 2 ] Bug #1213306 - CVE-2015-3143 curl: re-using authenticated connection when unauthenticated
        https://bugzilla.redhat.com/show_bug.cgi?id=1213306
  [ 3 ] Bug #1213335 - CVE-2015-3144 curl: host name out of boundary memory access
        https://bugzilla.redhat.com/show_bug.cgi?id=1213335
  [ 4 ] Bug #1213347 - CVE-2015-3145 curl: cookie parser out of boundary memory access
        https://bugzilla.redhat.com/show_bug.cgi?id=1213347
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update curl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list