nss-pem-1.0.3-5.el7, curl-7.29.0-51.el7
エラータID: AXSA:2019-3669:01
リリース日:
2019/02/15 Friday - 16:26
題名:
nss-pem-1.0.3-5.el7, curl-7.29.0-51.el7
影響のあるチャネル:
Asianux Server 7 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- libcurl には、細工された HTTP ヘッダーを送信されることにより、機密情報や
データが漏洩する脆弱性があります。(CVE-2018-1000007)
- curl には,FTP の URL の処理にバッファオーバーフローが存在し,
攻撃者がサービス拒否またはその他の影響を引き起こす脆弱性があります。(CVE-2018-1000120)
- curl および curl の LDAP のコードには NULL ポインタデレファレンスが存在し、
攻撃者がサービス拒否を引き起こす脆弱性があります。(CVE-2018-1000121)
- curl の RTSP RTP コードに、バッファオーバーリードが存在し、サービス拒否を
引き起こす、または情報漏洩する脆弱性があります。(CVE-2018-1000122)
- curl には、ダウンロードされた RTSP コンテンツを処理するコードに問題があり、
バッファオーバーリードに伴うサービス拒否、またはその他情報漏洩を引き起こす
脆弱性があります。(CVE-2018-1000301)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2018-1000007
libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value. Sending the same set of headers to subsequent hosts is in particular a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client's request.
libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value. Sending the same set of headers to subsequent hosts is in particular a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client's request.
CVE-2018-1000120
A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
CVE-2018-1000121
A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service
A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service
CVE-2018-1000122
A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
CVE-2018-1000301
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.
追加情報:
N/A
ダウンロード:
SRPMS
- curl-7.29.0-51.el7.src.rpm
MD5: 84954544689a777a1ae72b882c681602
SHA-256: ab15c109d37904894fd72f58294da4ed1628f9a17570de9758fb806fb8e4d32b
Size: 2.26 MB - nss-pem-1.0.3-5.el7.src.rpm
MD5: 7e2a91c91bf5537b46e988445d2786bf
SHA-256: b765cc99b8862149ed799b3dfabf4fd3c38ffddd07b19983b30643182a11ef0a
Size: 42.70 kB
Asianux Server 7 for x86_64
- curl-7.29.0-51.el7.x86_64.rpm
MD5: 6731bde1c3e7c34d3ffeee8d3e393c80
SHA-256: 1d53921427725b15fe5a4dcaf055eece9fdcd190ba1e5d789278bf3880176eec
Size: 268.05 kB - libcurl-7.29.0-51.el7.x86_64.rpm
MD5: 69d4dd24bdc980ac44e86698562bf6f8
SHA-256: 830bd23a9d5d6b95dce1ea09e12ff8cbef8cb1e43d9b3cb464a8e1a50a7b80d2
Size: 220.56 kB - libcurl-devel-7.29.0-51.el7.x86_64.rpm
MD5: cdac1a8fc11f5a00ac2aee4b7c638143
SHA-256: c3a25c2b9a2d67f1694ac3ba82d9c090e50367fb1fdc74b4d4fbfa6ca0de4ebb
Size: 300.71 kB - libcurl-7.29.0-51.el7.i686.rpm
MD5: a9529e9267a0b1a357f92622d266a4dc
SHA-256: ed5e42d0d9b336d6364aa2400119bb5a09acd67871a3dd87a0c5a73e619c32ef
Size: 223.38 kB - libcurl-devel-7.29.0-51.el7.i686.rpm
MD5: 8d013fbf8f4a7f9330bfc3c08c759c0a
SHA-256: 1cb7a3428a879fba4b8a257196f7dc30ec3ef561be21bcce94823326f06ba46f
Size: 300.77 kB - nss-pem-1.0.3-5.el7.x86_64.rpm
MD5: 8e5482c1577dd802cbf28b870d8e33c9
SHA-256: bbbb75daf1e14a1941b81aaaf564dd15c149776d7c7b53e3f2b90de9aa36c79a
Size: 72.94 kB - nss-pem-1.0.3-5.el7.i686.rpm
MD5: 9da61d2a570a6fed16e3ca1ebe4e421c
SHA-256: 9b20fcae665b28fb6943776caaf5bcf052b602d2fbae4824d037d8d22610e5a1
Size: 71.95 kB