OVMSA-2017-0059

OVMSA-2017-0059 - curl security update

Type:SECURITY
Impact:MODERATE
Release Date:2017-03-30

Description


[7.19.7-53]
- treat Negotiate authentication as connection-oriented (CVE-2017-2628)

[7.19.7-52]
- fix a bug in DNS caching code that causes a memory leak (#1302893)

[7.19.7-51]
- SSH: make CURLOPT_SSH_PUBLIC_KEYFILE treat '' as NULL (#1260742)

[7.19.7-50]
- use the default min/max TLS version provided by NSS (#1289205)

[7.19.7-49]
- prevent NSS from incorrectly re-using a session (#1269660)
- prevent test46 from failing due to expired cookie (#1277551)

[7.19.7-48]
- SSH: do not require public key file for user authentication (#1260742)

[7.19.7-47]
- make SCP/SFTP work with --proxytunnel (#1258566)


Related CVEs


CVE-2017-2628

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.3 (x86_64) curl-7.19.7-53.el6_9.src.rpmab314f84339e7b03f0d08c017c455938e82d44438ee9aaede73aebca4d0bf61eOVMSA-2020-0035ovm3_x86_64_3.3_patch
curl-7.19.7-53.el6_9.x86_64.rpm81dbf7dd920b6c6f34256a28a790932c9352055f3b1f40f9106fd0302fc9f873OVMSA-2020-0035ovm3_x86_64_3.3_patch
libcurl-7.19.7-53.el6_9.x86_64.rpm5e187d33a66ad22f3e7ed8a2c19ddc18c433030cb404ea4de3eafe5d01b79c0cOVMSA-2020-0035ovm3_x86_64_3.3_patch
Oracle VM 3.4 (x86_64) curl-7.19.7-53.el6_9.src.rpmab314f84339e7b03f0d08c017c455938e82d44438ee9aaede73aebca4d0bf61eOVMSA-2020-0035ovm34_x86_64_latest
curl-7.19.7-53.el6_9.x86_64.rpm81dbf7dd920b6c6f34256a28a790932c9352055f3b1f40f9106fd0302fc9f873OVMSA-2020-0035ovm34_x86_64_latest
libcurl-7.19.7-53.el6_9.x86_64.rpm5e187d33a66ad22f3e7ed8a2c19ddc18c433030cb404ea4de3eafe5d01b79c0cOVMSA-2020-0035ovm34_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete