nss-pem-1.0.3-5.el7, curl-7.29.0-51.el7
エラータID: AXSA:2019-3669:01
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
The nss-pem package provides the PEM file reader for Network Security Services (NSS) implemented as a PKCS#11 module.
Security Fix(es):
* curl: HTTP authentication leak in redirects (CVE-2018-1000007)
* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120)
* curl: RTSP RTP buffer over-read (CVE-2018-1000122)
* curl: Out-of-bounds heap read when missing RTSP headers allows information leak of denial of service (CVE-2018-1000301)
* curl: LDAP NULL pointer dereference (CVE-2018-1000121)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Asianux would like to thank the Curl project for reporting these issues. Upstream acknowledges Craig de Stigter as the original reporter of CVE-2018-1000007; Duy Phan Thanh as the original reporter of CVE-2018-1000120; Max Dymond as the original reporter of CVE-2018-1000122; the OSS-fuzz project as the original reporter of CVE-2018-1000301; and Dario Weisser as the original reporter of CVE-2018-1000121.
Additional Changes:
For detailed information on changes in this release, see the Asianux Server 7.6 Release Notes linked from the References section.
CVE-2018-1000007
libcurl 7.1 through 7.57.0 might accidentally leak authentication data
to third parties. When asked to send custom headers in its HTTP
requests, libcurl will send that set of headers first to the host in
the initial URL but also, if asked to follow redirects and a 30X HTTP
response code is returned, to the host mentioned in URL in the
`Location:` response header value. Sending the same set of headers to
subsequest hosts is in particular a problem for applications that pass
on custom `Authorization:` headers, as this header often contains
privacy sensitive information or data that could allow others to
impersonate the libcurl-using client's request.
CVE-2018-1000120
A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0
in the FTP URL handling that allows an attacker to cause a denial of
service or worse.
CVE-2018-1000121
A NULL pointer dereference exists in curl 7.21.0 to and including curl
7.58.0 in the LDAP code that allows an attacker to cause a denial of
service
CVE-2018-1000122
A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0
in the RTSP RTP handling code that allows an attacker to cause a
denial of service or information leakage
CVE-2018-1000301
curl version curl 7.20.0 to and including curl 7.59.0 contains a
CWE-126: Buffer Over-read vulnerability in denial of service that can
result in curl can be tricked into reading data beyond the end of a
heap based buffer used to store downloaded RTSP content.. This
vulnerability appears to have been fixed in curl < 7.20.0 and curl >=
7.60.0.
Update packages.
libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value. Sending the same set of headers to subsequent hosts is in particular a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client's request.
A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service
A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.
N/A
SRPMS
- curl-7.29.0-51.el7.src.rpm
MD5: 84954544689a777a1ae72b882c681602
SHA-256: ab15c109d37904894fd72f58294da4ed1628f9a17570de9758fb806fb8e4d32b
Size: 2.26 MB - nss-pem-1.0.3-5.el7.src.rpm
MD5: 7e2a91c91bf5537b46e988445d2786bf
SHA-256: b765cc99b8862149ed799b3dfabf4fd3c38ffddd07b19983b30643182a11ef0a
Size: 42.70 kB
Asianux Server 7 for x86_64
- curl-7.29.0-51.el7.x86_64.rpm
MD5: 6731bde1c3e7c34d3ffeee8d3e393c80
SHA-256: 1d53921427725b15fe5a4dcaf055eece9fdcd190ba1e5d789278bf3880176eec
Size: 268.05 kB - libcurl-7.29.0-51.el7.x86_64.rpm
MD5: 69d4dd24bdc980ac44e86698562bf6f8
SHA-256: 830bd23a9d5d6b95dce1ea09e12ff8cbef8cb1e43d9b3cb464a8e1a50a7b80d2
Size: 220.56 kB - libcurl-devel-7.29.0-51.el7.x86_64.rpm
MD5: cdac1a8fc11f5a00ac2aee4b7c638143
SHA-256: c3a25c2b9a2d67f1694ac3ba82d9c090e50367fb1fdc74b4d4fbfa6ca0de4ebb
Size: 300.71 kB - libcurl-7.29.0-51.el7.i686.rpm
MD5: a9529e9267a0b1a357f92622d266a4dc
SHA-256: ed5e42d0d9b336d6364aa2400119bb5a09acd67871a3dd87a0c5a73e619c32ef
Size: 223.38 kB - libcurl-devel-7.29.0-51.el7.i686.rpm
MD5: 8d013fbf8f4a7f9330bfc3c08c759c0a
SHA-256: 1cb7a3428a879fba4b8a257196f7dc30ec3ef561be21bcce94823326f06ba46f
Size: 300.77 kB - nss-pem-1.0.3-5.el7.x86_64.rpm
MD5: 8e5482c1577dd802cbf28b870d8e33c9
SHA-256: bbbb75daf1e14a1941b81aaaf564dd15c149776d7c7b53e3f2b90de9aa36c79a
Size: 72.94 kB - nss-pem-1.0.3-5.el7.i686.rpm
MD5: 9da61d2a570a6fed16e3ca1ebe4e421c
SHA-256: 9b20fcae665b28fb6943776caaf5bcf052b602d2fbae4824d037d8d22610e5a1
Size: 71.95 kB