Oracle Linux Security Advisory ELSA-2023-2650

https://linux.oracle.com/errata/ELSA-2023-2650.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
curl-7.76.1-23.el9_2.1.x86_64.rpm
curl-minimal-7.76.1-23.el9_2.1.x86_64.rpm
libcurl-7.76.1-23.el9_2.1.i686.rpm
libcurl-7.76.1-23.el9_2.1.x86_64.rpm
libcurl-devel-7.76.1-23.el9_2.1.i686.rpm
libcurl-devel-7.76.1-23.el9_2.1.x86_64.rpm
libcurl-minimal-7.76.1-23.el9_2.1.i686.rpm
libcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm

aarch64:
curl-7.76.1-23.el9_2.1.aarch64.rpm
curl-minimal-7.76.1-23.el9_2.1.aarch64.rpm
libcurl-7.76.1-23.el9_2.1.aarch64.rpm
libcurl-devel-7.76.1-23.el9_2.1.aarch64.rpm
libcurl-minimal-7.76.1-23.el9_2.1.aarch64.rpm


SRPMS:
https://oss.oracle.com:443/ol9/SRPMS-updates//curl-7.76.1-23.el9_2.1.src.rpm

Related CVEs:

CVE-2023-27535




Description of changes:

[7.76.1-23.el9_2.1]
- fix FTP too eager connection reuse (CVE-2023-27535)

[7.76.1-23]
- fix HTTP multi-header compression denial of service (CVE-2023-23916)

[7.76.1-22]
- smb/telnet: fix use-after-free when HTTP proxy denies tunnel (CVE-2022-43552)

[7.76.1-21]
- fix POST following PUT confusion (CVE-2022-32221)

[7.76.1-20]
- control code in cookie denial of service (CVE-2022-35252)


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle9: ELSA-2023-2650: curl security Moderate Security Update

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

Summary

[7.76.1-23.el9_2.1] - fix FTP too eager connection reuse (CVE-2023-27535) [7.76.1-23] - fix HTTP multi-header compression denial of service (CVE-2023-23916) [7.76.1-22] - smb/telnet: fix use-after-free when HTTP proxy denies tunnel (CVE-2022-43552) [7.76.1-21] - fix POST following PUT confusion (CVE-2022-32221) [7.76.1-20] - control code in cookie denial of service (CVE-2022-35252)

SRPMs

https://oss.oracle.com:443/ol9/SRPMS-updates//curl-7.76.1-23.el9_2.1.src.rpm

x86_64

curl-7.76.1-23.el9_2.1.x86_64.rpm curl-minimal-7.76.1-23.el9_2.1.x86_64.rpm libcurl-7.76.1-23.el9_2.1.i686.rpm libcurl-7.76.1-23.el9_2.1.x86_64.rpm libcurl-devel-7.76.1-23.el9_2.1.i686.rpm libcurl-devel-7.76.1-23.el9_2.1.x86_64.rpm libcurl-minimal-7.76.1-23.el9_2.1.i686.rpm libcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm

aarch64

curl-7.76.1-23.el9_2.1.aarch64.rpm curl-minimal-7.76.1-23.el9_2.1.aarch64.rpm libcurl-7.76.1-23.el9_2.1.aarch64.rpm libcurl-devel-7.76.1-23.el9_2.1.aarch64.rpm libcurl-minimal-7.76.1-23.el9_2.1.aarch64.rpm

i386

Severity
Related CVEs: CVE-2023-27535

Related News