OVMSA-2020-0035

OVMSA-2020-0035 - curl security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2020-08-26

Description


[7.19.7-54.0.2]
- Fix TFTP small blocksize heap buffer overflow (https://curl.haxx.se/docs/CVE-2019-5482.html)[CVE-2019-5482][Orabug:30568724]
462

[7.19.7-54.0.1]
- Security Fixes [OraBug: 28939992]
- CVE-2016-8615 cookie injection for other servers (https://curl.haxx.se/docs/CVE-2016-8615.html)
- CVE-2016-8616 case insensitive password comparison (https://curl.haxx.se/docs/CVE-2016-8616.html)
- CVE-2016-8617 OOB write via unchecked multiplication (https://curl.haxx.se/docs/CVE-2016-8617.html)
- CVE-2016-8618 double-free in curl_maprintf (https://curl.haxx.se/docs/CVE-2016-8618.html)
- CVE-2016-8619 double-free in krb5 code (https://curl.haxx.se/docs/CVE-2016-8619.html)
- CVE-2016-8621 curl_getdate read out of bounds (https://curl.haxx.se/docs/CVE-2016-8621.html)
- CVE-2016-8623 Use-after-free via shared cookies (https://curl.haxx.se/docs/CVE-2016-8623.html)
- CVE-2016-8624 invalid URL parsing with # (https://curl.haxx.se/docs/CVE-2016-8624.html)
- use PK11_CreateManagedGenericObject in libcurl to prevent memory leak [orabug 28666473]

[7.19.7-54]
- fix auth failure with duplicated WWW-Authenticate header (#1757643)


Related CVEs


CVE-2019-5482

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.4 (x86_64) curl-7.19.7-54.0.2.el6_10.src.rpm330f5e302b23de39fa1cffd4c012ee0cc51400c65b51332dc1e9b54a5e55e67d-ovm34_x86_64_latest
curl-7.19.7-54.0.2.el6_10.x86_64.rpm5881ce1899a193190171607614205ee26dc414b1343594b5b6162ba4f8592da0-ovm34_x86_64_latest
libcurl-7.19.7-54.0.2.el6_10.x86_64.rpmfadbf5563a2c29058dd09fd7f0016676b5cfc9170d610c7ee7507c2b19fc39d3-ovm34_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete