| Summary: | curl new security issue CVE-2013-4545 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | dan, sysadmin-bugs, tmb |
| Version: | 3 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/574198/ | ||
| Whiteboard: | MGA2TOO has_procedure advisory MGA2-32-OK mga2-64-ok mga3-32-ok mga3-64-ok | ||
| Source RPM: | curl-7.28.1-6.1.mga3.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2013-11-18 22:13:18 CET
David Walser
2013-11-18 22:13:26 CET
Whiteboard:
(none) =>
MGA2TOO Procedure: https://bugs.mageia.org/show_bug.cgi?id=4307#c11 Whiteboard:
MGA2TOO =>
MGA2TOO has_procedure Advisory uploaded. Please remove the 'advisory' whiteboard tag if anything changes. Whiteboard:
MGA2TOO has_procedure =>
MGA2TOO has_procedure advisory Tested successfully on mga2 x86 with procedure in comment#1, except using pop3s and imaps instead of pop3 and imap, respectively. CC:
(none) =>
dan (In reply to Dan Fandrich from comment #3) > Tested successfully on mga2 x86 with procedure in comment#1, except using > pop3s and imaps instead of pop3 and imap, respectively. I assume you mean i586. Adding the whiteboard marker. Thanks for testing, Dan. Whiteboard:
MGA2TOO has_procedure advisory =>
MGA2TOO has_procedure advisory MGA2-32-OK Testing complete mga2 64 Whiteboard:
MGA2TOO has_procedure advisory MGA2-32-OK =>
MGA2TOO has_procedure advisory MGA2-32-OK mga2-64-ok Testing complete x86_64, but not testing pop3 because not sure if it would remove the mail from the server. It doesn't remove it Samuel. Thanks for testing. Testing complete mga3 32 & 64 Validating. Could sysadmin please push from 2&3 core/updates_testing to updates. Thanks! Keywords:
(none) =>
validated_update Update pushed: http://advisories.mageia.org/MGASA-2013-0338.html Status:
NEW =>
RESOLVED FYI, adding this patch to the Mageia 2 version of curl uncovered a bug in curl with the --insecure option, where that option should disable SSL host verification and fails to do so. This was fixed in newer versions of curl, so Mageia 3 is unaffected. I've have added the simple one-liner fix in Mageia 2 SVN to fix this, but I won't push for a bugfix update unless someone thinks it's really important. References: http://lists.debian.org/debian-security-announce/2013/msg00213.html http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729965 |