Описание
ELSA-2009-0341: curl security update (MODERATE)
[7.15.5-2.1.el5_3.4]
- another correction of the patch for CVE-2009-0037
[7.15.5-2.1.el5_3.3]
- forwardport one hunk from upstream curl-7.15.1 Related: #485290
[7.15.5-2.1.el5_3.2]
- fix hunk applied to wrong place due to nonzero patch fuzz Related: #485289
[7.15.5-2.1.el5_3.1]
- fix CVE-2009-0037 Resolves: #485289
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
curl
7.15.5-2.1.el5_3.4
curl-devel
7.15.5-2.1.el5_3.4
Oracle Linux i386
curl
7.15.5-2.1.el5_3.4
curl-devel
7.15.5-2.1.el5_3.4
Связанные CVE
Связанные уязвимости
The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.
The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.
The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.
The redirect implementation in curl and libcurl 5.11 through 7.19.3, w ...
The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.