| Summary: | curl new security issues CVE-2015-3236 and CVE-2015-3237 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, mageia, marc.lattemann, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/649074/ | ||
| Whiteboard: | has_procedure MGA5-32-OK MGA5-64-OK advisory | ||
| Source RPM: | curl-7.40.0-3.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-06-17 17:24:29 CEST
David Walser
2015-06-17 17:24:38 CEST
Whiteboard:
(none) =>
MGA5TOO
Sander Lepik
2015-06-20 15:24:35 CEST
CC:
(none) =>
mageia Patched packages uploaded for Mageia 5 and Cauldron. Testing procedure: https://bugs.mageia.org/show_bug.cgi?id=14468#c4 Advisory: ======================== Updated curl packages fix security vulnerabilities: libcurl can wrongly send HTTP credentials when re-using connections. Even if the handle for an HTTP connection is reset, it retains the credentials, which can cause them to be unintentionally leaked in subsequent requests (CVE-2015-3236). libcurl can get tricked by a malicious SMB server to send off data it did not intend to. A malicious SMB server can use this to access arbitrary process memory, or to crash the client, causing a denial of service (CVE-2015-3237). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237 http://curl.haxx.se/docs/adv_20150617A.html http://curl.haxx.se/docs/adv_20150617B.html ======================== Updated packages in core/updates_testing: ======================== curl-7.40.0-3.1.mga5 libcurl4-7.40.0-3.1.mga5 libcurl-devel-7.40.0-3.1.mga5 curl-examples-7.40.0-3.1.mga5 from curl-7.40.0-3.1.mga5.src.rpm Version:
Cauldron =>
5
David Walser
2015-06-23 20:33:05 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/649074/ Fedora has issued an advisory for this on June 20: https://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html
David Walser
2015-07-04 20:34:05 CEST
Whiteboard:
(none) =>
has_procedure tested mga5 for 32 and 64bit. No specific poc found, so used tests as linked in comment 1 (expect using pop3s and imaps): everything is working as expected. Please upload advisory and validate package. Thanks
Marc Lattemann
2015-07-04 21:01:23 CEST
CC:
(none) =>
marc.lattemann
Marc Lattemann
2015-07-04 21:01:35 CEST
Whiteboard:
has_procedure MGA5-32-OK MGA5-6 =>
has_procedure MGA5-32-OK MGA5-64-OK Advisory committed to svn. Someone from the sysadmin team please push 16140.adv to updates. Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0263.html Status:
NEW =>
RESOLVED |