Oracle Linux Security Advisory ELSA-2023-7743

https://linux.oracle.com/errata/ELSA-2023-7743.html

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

x86_64:
curl-7.29.0-59.0.3.el7_9.2.x86_64.rpm
libcurl-7.29.0-59.0.3.el7_9.2.i686.rpm
libcurl-7.29.0-59.0.3.el7_9.2.x86_64.rpm
libcurl-devel-7.29.0-59.0.3.el7_9.2.i686.rpm
libcurl-devel-7.29.0-59.0.3.el7_9.2.x86_64.rpm


SRPMS:
https://oss.oracle.com:443/ol7/SRPMS-updates//curl-7.29.0-59.0.3.el7_9.2.src.rpm

Related CVEs:

CVE-2022-43552




Description of changes:

[7.29.0-59.0.3.el7_9.2]
- load CA certificates even with --insecure [Orabug: 32836997]
- Fix TFTP small blocksize heap buffer overflow (: 30568724]
- Security Fixes [OraBug: 28939992]
- CVE-2016-8615 cookie injection for other servers (https://curl.haxx.se/docs/CVE-2016-8615.html)
- CVE-2016-8616 case insensitive password comparison (https://curl.se/docs/CVE-2016-8616.html)
- CVE-2016-8617 OOB write via unchecked multiplication (https://curl.se/docs/CVE-2016-8617.html)
- CVE-2016-8618 double-free in curl_maprintf (https://curl.haxx.se/docs/CVE-2016-8618.html)
- CVE-2016-8619 double-free in krb5 code (https://curl.haxx.se/docs/CVE-2016-8619.html)
- CVE-2016-8621 curl_getdate read out of bounds (https://curl.se/docs/CVE-2016-8621.html)
- CVE-2016-8622 URL unescape heap overflow via integer truncation (https://curl.haxx.se/docs/CVE-2016-8622.html)
- CVE-2016-8623 Use-after-free via shared cookies (https://curl.haxx.se/docs/CVE-2016-8623.html)
- CVE-2016-8624 invalid URL parsing with # (https://curl.se/docs/CVE-2016-8624.html)
- Drop 1001-tftp-Alloc-maximum-blksize-and-use-default-unless-OA.patch

[7.29.0-59.el7_9.2]
- fix HTTP proxy deny use after free (CVE-2022-43552)
- rebuild certs with 2048-bit RSA keys


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle7: ELSA-2023-7743: curl Low Security Update

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

Summary

[7.29.0-59.0.3.el7_9.2] - load CA certificates even with --insecure [Orabug: 32836997] - Fix TFTP small blocksize heap buffer overflow (: 30568724] - Security Fixes [OraBug: 28939992] - CVE-2016-8615 cookie injection for other servers (https://curl.haxx.se/docs/CVE-2016-8615.html) - CVE-2016-8616 case insensitive password comparison (https://curl.se/docs/CVE-2016-8616.html) - CVE-2016-8617 OOB write via unchecked multiplication (https://curl.se/docs/CVE-2016-8617.html) - CVE-2016-8618 double-free in curl_maprintf (https://curl.haxx.se/docs/CVE-2016-8618.html) - CVE-2016-8619 double-free in krb5 code (https://curl.haxx.se/docs/CVE-2016-8619.html) - CVE-2016-8621 curl_getdate read out of bounds (https://curl.se/docs/CVE-2016-8621.html) - CVE-2016-8622 URL unescape heap overflow via integer truncation (https://curl.haxx.se/docs/CVE-2016-8622.html) - CVE-2016-8623 Use-after-free via shared cookies (https://curl.haxx.se/docs/CVE-2016-8623.html) - CVE-2016-8624 invalid URL parsing with # (https://curl.se/docs/CVE-2016-8624.html) - Drop 1001-tftp-Alloc-maximum-blksize-and-use-default-unless-OA.patch [7.29.0-59.el7_9.2] - fix HTTP proxy deny use after free (CVE-2022-43552) - rebuild certs with 2048-bit RSA keys

SRPMs

https://oss.oracle.com:443/ol7/SRPMS-updates//curl-7.29.0-59.0.3.el7_9.2.src.rpm

x86_64

curl-7.29.0-59.0.3.el7_9.2.x86_64.rpm libcurl-7.29.0-59.0.3.el7_9.2.i686.rpm libcurl-7.29.0-59.0.3.el7_9.2.x86_64.rpm libcurl-devel-7.29.0-59.0.3.el7_9.2.i686.rpm libcurl-devel-7.29.0-59.0.3.el7_9.2.x86_64.rpm

aarch64

i386

Severity
Related CVEs: CVE-2022-43552

Related News

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo