nss-pem-1.0.3-5.el7, curl-7.29.0-51.el7

エラータID: AXSA:2019-3669:01

Release date: 
Friday, February 15, 2019 - 16:26
Subject: 
nss-pem-1.0.3-5.el7, curl-7.29.0-51.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

The nss-pem package provides the PEM file reader for Network Security Services (NSS) implemented as a PKCS#11 module.

Security Fix(es):

* curl: HTTP authentication leak in redirects (CVE-2018-1000007)

* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120)

* curl: RTSP RTP buffer over-read (CVE-2018-1000122)

* curl: Out-of-bounds heap read when missing RTSP headers allows information leak of denial of service (CVE-2018-1000301)

* curl: LDAP NULL pointer dereference (CVE-2018-1000121)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Asianux would like to thank the Curl project for reporting these issues. Upstream acknowledges Craig de Stigter as the original reporter of CVE-2018-1000007; Duy Phan Thanh as the original reporter of CVE-2018-1000120; Max Dymond as the original reporter of CVE-2018-1000122; the OSS-fuzz project as the original reporter of CVE-2018-1000301; and Dario Weisser as the original reporter of CVE-2018-1000121.

Additional Changes:

For detailed information on changes in this release, see the Asianux Server 7.6 Release Notes linked from the References section.

CVE-2018-1000007
libcurl 7.1 through 7.57.0 might accidentally leak authentication data
to third parties. When asked to send custom headers in its HTTP
requests, libcurl will send that set of headers first to the host in
the initial URL but also, if asked to follow redirects and a 30X HTTP
response code is returned, to the host mentioned in URL in the
`Location:` response header value. Sending the same set of headers to
subsequest hosts is in particular a problem for applications that pass
on custom `Authorization:` headers, as this header often contains
privacy sensitive information or data that could allow others to
impersonate the libcurl-using client's request.
CVE-2018-1000120
A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0
in the FTP URL handling that allows an attacker to cause a denial of
service or worse.
CVE-2018-1000121
A NULL pointer dereference exists in curl 7.21.0 to and including curl
7.58.0 in the LDAP code that allows an attacker to cause a denial of
service
CVE-2018-1000122
A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0
in the RTSP RTP handling code that allows an attacker to cause a
denial of service or information leakage
CVE-2018-1000301
curl version curl 7.20.0 to and including curl 7.59.0 contains a
CWE-126: Buffer Over-read vulnerability in denial of service that can
result in curl can be tricked into reading data beyond the end of a
heap based buffer used to store downloaded RTSP content.. This
vulnerability appears to have been fixed in curl < 7.20.0 and curl >=
7.60.0.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. curl-7.29.0-51.el7.src.rpm
    MD5: 84954544689a777a1ae72b882c681602
    SHA-256: ab15c109d37904894fd72f58294da4ed1628f9a17570de9758fb806fb8e4d32b
    Size: 2.26 MB
  2. nss-pem-1.0.3-5.el7.src.rpm
    MD5: 7e2a91c91bf5537b46e988445d2786bf
    SHA-256: b765cc99b8862149ed799b3dfabf4fd3c38ffddd07b19983b30643182a11ef0a
    Size: 42.70 kB

Asianux Server 7 for x86_64
  1. curl-7.29.0-51.el7.x86_64.rpm
    MD5: 6731bde1c3e7c34d3ffeee8d3e393c80
    SHA-256: 1d53921427725b15fe5a4dcaf055eece9fdcd190ba1e5d789278bf3880176eec
    Size: 268.05 kB
  2. libcurl-7.29.0-51.el7.x86_64.rpm
    MD5: 69d4dd24bdc980ac44e86698562bf6f8
    SHA-256: 830bd23a9d5d6b95dce1ea09e12ff8cbef8cb1e43d9b3cb464a8e1a50a7b80d2
    Size: 220.56 kB
  3. libcurl-devel-7.29.0-51.el7.x86_64.rpm
    MD5: cdac1a8fc11f5a00ac2aee4b7c638143
    SHA-256: c3a25c2b9a2d67f1694ac3ba82d9c090e50367fb1fdc74b4d4fbfa6ca0de4ebb
    Size: 300.71 kB
  4. libcurl-7.29.0-51.el7.i686.rpm
    MD5: a9529e9267a0b1a357f92622d266a4dc
    SHA-256: ed5e42d0d9b336d6364aa2400119bb5a09acd67871a3dd87a0c5a73e619c32ef
    Size: 223.38 kB
  5. libcurl-devel-7.29.0-51.el7.i686.rpm
    MD5: 8d013fbf8f4a7f9330bfc3c08c759c0a
    SHA-256: 1cb7a3428a879fba4b8a257196f7dc30ec3ef561be21bcce94823326f06ba46f
    Size: 300.77 kB
  6. nss-pem-1.0.3-5.el7.x86_64.rpm
    MD5: 8e5482c1577dd802cbf28b870d8e33c9
    SHA-256: bbbb75daf1e14a1941b81aaaf564dd15c149776d7c7b53e3f2b90de9aa36c79a
    Size: 72.94 kB
  7. nss-pem-1.0.3-5.el7.i686.rpm
    MD5: 9da61d2a570a6fed16e3ca1ebe4e421c
    SHA-256: 9b20fcae665b28fb6943776caaf5bcf052b602d2fbae4824d037d8d22610e5a1
    Size: 71.95 kB