|
|
Subscribe / Log in / New account

Fedora alert FEDORA-2022-39688a779d (curl)

From:  updates@fedoraproject.org
To:  package-announce@lists.fedoraproject.org
Subject:  [SECURITY] Fedora 35 Update: curl-7.79.1-7.fc35
Date:  Thu, 10 Nov 2022 16:21:52 +0000
Message-ID:  <20221110162152.D4822301E035@bastion01.iad2.fedoraproject.org>
Archive-link:  Article

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2022-39688a779d 2022-11-10 16:21:24.293504 -------------------------------------------------------------------------------- Name : curl Product : Fedora 35 Version : 7.79.1 Release : 7.fc35 URL : https://curl.se/ Summary : A utility for getting files from remote servers (FTP, HTTP, and others) Description : curl is a command line tool for transferring data with URL syntax, supporting FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP form based upload, proxies, cookies, user+password authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer resume, proxy tunneling and a busload of other useful tricks. -------------------------------------------------------------------------------- Update Information: - url: use IDN decoded names for HSTS checks (CVE-2022-42916) - http_proxy: restore the protocol pointer on error (CVE-2022-42915) - netrc: replace fgets with Curl_get_line (CVE-2022-35260) - fix POST following PUT confusion (CVE-2022-32221) -------------------------------------------------------------------------------- ChangeLog: * Wed Oct 26 2022 Kamil Dudka <kdudka@redhat.com> - 7.79.1-7 - url: use IDN decoded names for HSTS checks (CVE-2022-42916) - http_proxy: restore the protocol pointer on error (CVE-2022-42915) - netrc: replace fgets with Curl_get_line (CVE-2022-35260) - fix POST following PUT confusion (CVE-2022-32221) -------------------------------------------------------------------------------- References: [ 1 ] Bug #2137769 - CVE-2022-42916 curl: HSTS bypass via IDN [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2137769 [ 2 ] Bug #2137780 - CVE-2022-32221 curl: POST following PUT confusion [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2137780 [ 3 ] Bug #2138111 - CVE-2022-42915 curl: HTTP proxy double-free [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2138111 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2022-39688a779d' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgr... All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-cond... List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-ann... Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds