--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2021-fc96a3a749
2021-10-02 01:09:40.654419
--------------------------------------------------------------------------------Name        : curl
Product     : Fedora 33
Version     : 7.71.1
Release     : 11.fc33
URL         : https://curl.se/
Summary     : A utility for getting files from remote servers (FTP, HTTP, and others)
Description :
curl is a command line tool for transferring data with URL syntax, supporting
FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,
SMTP, POP3 and RTSP.  curl supports SSL certificates, HTTP POST, HTTP PUT, FTP
uploading, HTTP form based upload, proxies, cookies, user+password
authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer
resume, proxy tunneling and a busload of other useful tricks.

--------------------------------------------------------------------------------Update Information:

- CVE-2021-22947 - STARTTLS protocol injection via MITM - CVE-2021-22946 -protocol downgrade required TLS bypassed - CVE-2021-22945 - use-after-free and
double-free in MQTT sending
--------------------------------------------------------------------------------ChangeLog:

* Fri Sep 17 2021 Kamil Dudka  - 7.71.1-11
- fix STARTTLS protocol injection via MITM (CVE-2021-22947)
- fix protocol downgrade required TLS bypass (CVE-2021-22946)
- fix use-after-free and double-free in MQTT sending (CVE-2021-22945)
* Wed Jul 21 2021 Kamil Dudka  - 7.71.1-10
- fix TELNET stack contents disclosure again (CVE-2021-22925)
- fix TELNET stack contents disclosure (CVE-2021-22898)
- fix bad connection reuse due to flawed path name checks (CVE-2021-22924)
- disable metalink support to fix the following vulnerabilities
    CVE-2021-22923 - metalink download sends credentials
    CVE-2021-22922 - wrong content via metalink not discarded
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #2004362 - CVE-2021-22945 curl: use-after-free and double-free in MQTT sending [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2004362
  [ 2 ] Bug #2004363 - CVE-2021-22947 curl: STARTTLS protocol injection via MITM [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2004363
  [ 3 ] Bug #2004927 - CVE-2021-22946 curl: protocol downgrade required TLS bypassed [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2004927
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-fc96a3a749' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Fedora 33: curl 2021-fc96a3a749

October 1, 2021
- CVE-2021-22947 - STARTTLS protocol injection via MITM - CVE-2021-22946 - protocol downgrade required TLS bypassed - CVE-2021-22945 - use-after-free and double-free in MQTT sendin...

Summary

curl is a command line tool for transferring data with URL syntax, supporting

FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,

SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP

uploading, HTTP form based upload, proxies, cookies, user+password

authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer

resume, proxy tunneling and a busload of other useful tricks.

- CVE-2021-22947 - STARTTLS protocol injection via MITM - CVE-2021-22946 -protocol downgrade required TLS bypassed - CVE-2021-22945 - use-after-free and

double-free in MQTT sending

* Fri Sep 17 2021 Kamil Dudka - 7.71.1-11

- fix STARTTLS protocol injection via MITM (CVE-2021-22947)

- fix protocol downgrade required TLS bypass (CVE-2021-22946)

- fix use-after-free and double-free in MQTT sending (CVE-2021-22945)

* Wed Jul 21 2021 Kamil Dudka - 7.71.1-10

- fix TELNET stack contents disclosure again (CVE-2021-22925)

- fix TELNET stack contents disclosure (CVE-2021-22898)

- fix bad connection reuse due to flawed path name checks (CVE-2021-22924)

- disable metalink support to fix the following vulnerabilities

CVE-2021-22923 - metalink download sends credentials

CVE-2021-22922 - wrong content via metalink not discarded

[ 1 ] Bug #2004362 - CVE-2021-22945 curl: use-after-free and double-free in MQTT sending [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=2004362

[ 2 ] Bug #2004363 - CVE-2021-22947 curl: STARTTLS protocol injection via MITM [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=2004363

[ 3 ] Bug #2004927 - CVE-2021-22946 curl: protocol downgrade required TLS bypassed [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=2004927

su -c 'dnf upgrade --advisory FEDORA-2021-fc96a3a749' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

FEDORA-2021-fc96a3a749 2021-10-02 01:09:40.654419 Product : Fedora 33 Version : 7.71.1 Release : 11.fc33 URL : https://curl.se/ Summary : A utility for getting files from remote servers (FTP, HTTP, and others) Description : curl is a command line tool for transferring data with URL syntax, supporting FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP form based upload, proxies, cookies, user+password authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer resume, proxy tunneling and a busload of other useful tricks. - CVE-2021-22947 - STARTTLS protocol injection via MITM - CVE-2021-22946 -protocol downgrade required TLS bypassed - CVE-2021-22945 - use-after-free and double-free in MQTT sending * Fri Sep 17 2021 Kamil Dudka - 7.71.1-11 - fix STARTTLS protocol injection via MITM (CVE-2021-22947) - fix protocol downgrade required TLS bypass (CVE-2021-22946) - fix use-after-free and double-free in MQTT sending (CVE-2021-22945) * Wed Jul 21 2021 Kamil Dudka - 7.71.1-10 - fix TELNET stack contents disclosure again (CVE-2021-22925) - fix TELNET stack contents disclosure (CVE-2021-22898) - fix bad connection reuse due to flawed path name checks (CVE-2021-22924) - disable metalink support to fix the following vulnerabilities CVE-2021-22923 - metalink download sends credentials CVE-2021-22922 - wrong content via metalink not discarded [ 1 ] Bug #2004362 - CVE-2021-22945 curl: use-after-free and double-free in MQTT sending [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2004362 [ 2 ] Bug #2004363 - CVE-2021-22947 curl: STARTTLS protocol injection via MITM [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2004363 [ 3 ] Bug #2004927 - CVE-2021-22946 curl: protocol downgrade required TLS bypassed [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2004927 su -c 'dnf upgrade --advisory FEDORA-2021-fc96a3a749' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/ Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Change Log

References

Update Instructions

Severity
Product : Fedora 33
Version : 7.71.1
Release : 11.fc33
URL : https://curl.se/
Summary : A utility for getting files from remote servers (FTP, HTTP, and others)

Related News