Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:1786-1

Опубликовано: 27 мая 2021
Источник: suse-cvrf

Описание

Security update for curl

This update for curl fixes the following issues:

  • CVE-2021-22898: TELNET stack contents disclosure (bsc#1186114)
  • CVE-2021-22876: The automatic referer leaks credentials (bsc#1183933)
  • CVE-2020-8286: Inferior OCSP verification (bsc#1179593)
  • CVE-2020-8285: FTP wildcard stack overflow (bsc#1179399)
  • CVE-2020-8284: Trusting FTP PASV responses (bsc#1179398)
  • CVE-2020-8231: libcurl will pick and use the wrong connection with multiple requests with libcurl's multi API and the 'CURLOPT_CONNECT_ONLY' option (bsc#1175109)
  • Fix: SFTP uploads result in empty uploaded files (bsc#1177976)

Список пакетов

Container suse/sles12sp4:latest
libcurl4-7.60.0-4.20.1
Image SLES12-SP4-Azure-BYOS
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
Image SLES12-SP4-EC2-HVM-BYOS
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
Image SLES12-SP4-GCE-BYOS
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
Image SLES12-SP4-SAP-Azure
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
Image SLES12-SP4-SAP-Azure-BYOS
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
Image SLES12-SP4-SAP-EC2-HVM
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
Image SLES12-SP4-SAP-EC2-HVM-BYOS
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
Image SLES12-SP4-SAP-GCE
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
Image SLES12-SP4-SAP-GCE-BYOS
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
SUSE Linux Enterprise Server 12 SP4-LTSS
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
libcurl4-32bit-7.60.0-4.20.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
libcurl4-32bit-7.60.0-4.20.1
SUSE OpenStack Cloud 9
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
libcurl4-32bit-7.60.0-4.20.1
SUSE OpenStack Cloud Crowbar 9
curl-7.60.0-4.20.1
libcurl4-7.60.0-4.20.1
libcurl4-32bit-7.60.0-4.20.1

Описание

Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.


Затронутые продукты
Container suse/sles12sp4:latest:libcurl4-7.60.0-4.20.1
Image SLES12-SP4-Azure-BYOS:curl-7.60.0-4.20.1
Image SLES12-SP4-Azure-BYOS:libcurl4-7.60.0-4.20.1
Image SLES12-SP4-EC2-HVM-BYOS:curl-7.60.0-4.20.1

Ссылки

Описание

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.


Затронутые продукты
Container suse/sles12sp4:latest:libcurl4-7.60.0-4.20.1
Image SLES12-SP4-Azure-BYOS:curl-7.60.0-4.20.1
Image SLES12-SP4-Azure-BYOS:libcurl4-7.60.0-4.20.1
Image SLES12-SP4-EC2-HVM-BYOS:curl-7.60.0-4.20.1

Ссылки

Описание

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.


Затронутые продукты
Container suse/sles12sp4:latest:libcurl4-7.60.0-4.20.1
Image SLES12-SP4-Azure-BYOS:curl-7.60.0-4.20.1
Image SLES12-SP4-Azure-BYOS:libcurl4-7.60.0-4.20.1
Image SLES12-SP4-EC2-HVM-BYOS:curl-7.60.0-4.20.1

Ссылки

Описание

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.


Затронутые продукты
Container suse/sles12sp4:latest:libcurl4-7.60.0-4.20.1
Image SLES12-SP4-Azure-BYOS:curl-7.60.0-4.20.1
Image SLES12-SP4-Azure-BYOS:libcurl4-7.60.0-4.20.1
Image SLES12-SP4-EC2-HVM-BYOS:curl-7.60.0-4.20.1

Ссылки

Описание

curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.


Затронутые продукты
Container suse/sles12sp4:latest:libcurl4-7.60.0-4.20.1
Image SLES12-SP4-Azure-BYOS:curl-7.60.0-4.20.1
Image SLES12-SP4-Azure-BYOS:libcurl4-7.60.0-4.20.1
Image SLES12-SP4-EC2-HVM-BYOS:curl-7.60.0-4.20.1

Ссылки

Описание

curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.


Затронутые продукты
Container suse/sles12sp4:latest:libcurl4-7.60.0-4.20.1
Image SLES12-SP4-Azure-BYOS:curl-7.60.0-4.20.1
Image SLES12-SP4-Azure-BYOS:libcurl4-7.60.0-4.20.1
Image SLES12-SP4-EC2-HVM-BYOS:curl-7.60.0-4.20.1

Ссылки
Уязвимость SUSE-SU-2021:1786-1