OVMSA-2017-0059

OVMSA-2017-0059 - curl security update

Type:SECURITY
Severity:MODERATE
Release Date:2017-03-30

Description


[7.19.7-53]
- treat Negotiate authentication as connection-oriented (CVE-2017-2628)

[7.19.7-52]
- fix a bug in DNS caching code that causes a memory leak (#1302893)

[7.19.7-51]
- SSH: make CURLOPT_SSH_PUBLIC_KEYFILE treat '' as NULL (#1260742)

[7.19.7-50]
- use the default min/max TLS version provided by NSS (#1289205)

[7.19.7-49]
- prevent NSS from incorrectly re-using a session (#1269660)
- prevent test46 from failing due to expired cookie (#1277551)

[7.19.7-48]
- SSH: do not require public key file for user authentication (#1260742)

[7.19.7-47]
- make SCP/SFTP work with --proxytunnel (#1258566)


Related CVEs


CVE-2017-2628

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.3 (x86_64) curl-7.19.7-53.el6_9.src.rpmd0eaf91398d24985f39f3c0f6d0092cfOVMSA-2020-0035
curl-7.19.7-53.el6_9.x86_64.rpmdb662c1757a40e4e506ead9b446ee949OVMSA-2020-0035
libcurl-7.19.7-53.el6_9.x86_64.rpm1d9b05c590a83e265de2db25b655946cOVMSA-2020-0035
Oracle VM 3.4 (x86_64) curl-7.19.7-53.el6_9.src.rpmd0eaf91398d24985f39f3c0f6d0092cfOVMSA-2020-0035
curl-7.19.7-53.el6_9.x86_64.rpmdb662c1757a40e4e506ead9b446ee949OVMSA-2020-0035
libcurl-7.19.7-53.el6_9.x86_64.rpm1d9b05c590a83e265de2db25b655946cOVMSA-2020-0035



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete