LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: 2010:062: curl Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake A vulnerability has been found and corrected in curl: content_encoding.c in libcurl 7.10.5 through 7.19.7, when zlib is enabled, does not properly restrict the amount of callback data sent to an application that requests automatic decompression, which might [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2010:062
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : curl
 Date    : March 19, 2010
 Affected: 2008.0, 2009.0, 2009.1, 2010.0, Corporate 4.0,
           Enterprise Server 5.0, Multi Network Firewall 2.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability has been found and corrected in curl:
 
 content_encoding.c in libcurl 7.10.5 through 7.19.7, when zlib is
 enabled, does not properly restrict the amount of callback data sent
 to an application that requests automatic decompression, which might
 allow remote attackers to cause a denial of service (application
 crash) or have unspecified other impact by sending crafted compressed
 data to an application that relies on the intended data-length limit
 (CVE-2010-0734).
 
 Packages for 2008.0 are provided for Corporate Desktop 2008.0
 customers.
 
 The updated packages have been patched to correct theis issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.0:
 3b9700f3becc35f9479762f8d8118005  2008.0/i586/curl-7.16.4-2.3mdv2008.0.i586.rpm
 58edc5e841606c3501beeddc71309a44  2008.0/i586/libcurl4-7.16.4-2.3mdv2008.0.i586.rpm
 1c5d61cb13b75182ea24e1eb91ea9022  2008.0/i586/libcurl-devel-7.16.4-2.3mdv2008.0.i586.rpm 
 91f4758aac7a219f91963ce076fb8e08  2008.0/SRPMS/curl-7.16.4-2.3mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 59dda0d139c914b0764a1525aedd9e2b  2008.0/x86_64/curl-7.16.4-2.3mdv2008.0.x86_64.rpm
 ce13767698748c5d509e8fd6823b16cf  2008.0/x86_64/lib64curl4-7.16.4-2.3mdv2008.0.x86_64.rpm
 3d7463fc2250204ed0b4a88c5d981901  2008.0/x86_64/lib64curl-devel-7.16.4-2.3mdv2008.0.x86_64.rpm 
 91f4758aac7a219f91963ce076fb8e08  2008.0/SRPMS/curl-7.16.4-2.3mdv2008.0.src.rpm

 Mandriva Linux 2009.0:
 8cdbd92df1a130ba9dcb2b18cc3b97a2  2009.0/i586/curl-7.19.0-2.4mdv2009.0.i586.rpm
 06be4cf361e00458ca9f6f6448bfd1aa  2009.0/i586/curl-examples-7.19.0-2.4mdv2009.0.i586.rpm
 862148fd41195d65dd7dbdcc5a1a0d3c  2009.0/i586/libcurl4-7.19.0-2.4mdv2009.0.i586.rpm
 3c32ba7af388e7351ee0cb963a803443  2009.0/i586/libcurl-devel-7.19.0-2.4mdv2009.0.i586.rpm 
 5569a1c539f8cd5639f568a46e7736e0  2009.0/SRPMS/curl-7.19.0-2.4mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 2bc00188f2f8823f00899edfaf6f1950  2009.0/x86_64/curl-7.19.0-2.4mdv2009.0.x86_64.rpm
 c1443c8c88cf182b593c3a3c523f77b6  2009.0/x86_64/curl-examples-7.19.0-2.4mdv2009.0.x86_64.rpm
 16dc3853657e667545bc20af1e7436bb  2009.0/x86_64/lib64curl4-7.19.0-2.4mdv2009.0.x86_64.rpm
 3cad511e60155ed7ad4b1076e66e58f5  2009.0/x86_64/lib64curl-devel-7.19.0-2.4mdv2009.0.x86_64.rpm 
 5569a1c539f8cd5639f568a46e7736e0  2009.0/SRPMS/curl-7.19.0-2.4mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 15a8fde0e07a6ac7e4e09bbad25d33dd  2009.1/i586/curl-7.19.4-1.1mdv2009.1.i586.rpm
 89207880380ba85543bd13e145199b71  2009.1/i586/curl-examples-7.19.4-1.1mdv2009.1.i586.rpm
 b49e88d047d05ef28e1d1d4452a1808d  2009.1/i586/libcurl4-7.19.4-1.1mdv2009.1.i586.rpm
 80477218d684b9e43e6e8adb1f2f3e50  2009.1/i586/libcurl-devel-7.19.4-1.1mdv2009.1.i586.rpm 
 16bb01108d6dda2be2495e45c2669958  2009.1/SRPMS/curl-7.19.4-1.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 acce92bd77632cff44d681d4de8481ab  2009.1/x86_64/curl-7.19.4-1.1mdv2009.1.x86_64.rpm
 1517c5562a4fe98d8a09ca3e81abd4f1  2009.1/x86_64/curl-examples-7.19.4-1.1mdv2009.1.x86_64.rpm
 0946b748e6b23013cb68db4748b3e731  2009.1/x86_64/lib64curl4-7.19.4-1.1mdv2009.1.x86_64.rpm
 60566c2bbc2ea405b48830b54ec6189f  2009.1/x86_64/lib64curl-devel-7.19.4-1.1mdv2009.1.x86_64.rpm 
 16bb01108d6dda2be2495e45c2669958  2009.1/SRPMS/curl-7.19.4-1.1mdv2009.1.src.rpm

 Mandriva Linux 2010.0:
 ecd86c44d5f8aaff8c9c2361d9f3896b  2010.0/i586/curl-7.19.6-3.1mdv2010.0.i586.rpm
 89d8674862c81e9188758b81fa4b2121  2010.0/i586/curl-examples-7.19.6-3.1mdv2010.0.i586.rpm
 5090bbf68e7ded8ef1e67845c13f28ab  2010.0/i586/libcurl4-7.19.6-3.1mdv2010.0.i586.rpm
 e545ee4b79873bfeeccb73ec166b6536  2010.0/i586/libcurl-devel-7.19.6-3.1mdv2010.0.i586.rpm 
 cef8204400fc2780819f929e0d664ea1  2010.0/SRPMS/curl-7.19.6-3.1mdv2010.0.src.rpm

 Mandriva Linux 2010.0/X86_64:
 02f4d1ee6459c06bc51c43ef1ae7dc7a  2010.0/x86_64/curl-7.19.6-3.1mdv2010.0.x86_64.rpm
 4417f2b6a5d0f5a8ebfbed90e524f5ac  2010.0/x86_64/curl-examples-7.19.6-3.1mdv2010.0.x86_64.rpm
 dd05912726d564c779c3c890ff537b07  2010.0/x86_64/lib64curl4-7.19.6-3.1mdv2010.0.x86_64.rpm
 10c8dc60a6c64c22a7f8dbd100955c9e  2010.0/x86_64/lib64curl-devel-7.19.6-3.1mdv2010.0.x86_64.rpm 
 cef8204400fc2780819f929e0d664ea1  2010.0/SRPMS/curl-7.19.6-3.1mdv2010.0.src.rpm

 Corporate 4.0:
 75f31c808f0fe1d04a1919a50c3950ae  corporate/4.0/i586/curl-7.14.0-2.5.20060mlcs4.i586.rpm
 8709d1eab88253ad429fbef0cf6a4af0  corporate/4.0/i586/libcurl3-7.14.0-2.5.20060mlcs4.i586.rpm
 d72194e4561e0621497dcc605e6d3fd4  corporate/4.0/i586/libcurl3-devel-7.14.0-2.5.20060mlcs4.i586.rpm 
 783cf9616effb3ca339b557f55f78f8f  corporate/4.0/SRPMS/curl-7.14.0-2.5.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 1e4d26e8f0b3ab500e25065f1d11e490  corporate/4.0/x86_64/curl-7.14.0-2.5.20060mlcs4.x86_64.rpm
 adcfc892f29fd43810f1f808dc51548e  corporate/4.0/x86_64/lib64curl3-7.14.0-2.5.20060mlcs4.x86_64.rpm
 f25c93fe73f19a7f4669541926e11c49  corporate/4.0/x86_64/lib64curl3-devel-7.14.0-2.5.20060mlcs4.x86_64.rpm 
 783cf9616effb3ca339b557f55f78f8f  corporate/4.0/SRPMS/curl-7.14.0-2.5.20060mlcs4.src.rpm

 Mandriva Enterprise Server 5:
 3f8eea4f36bee7a06c0f7c063fe920a7  mes5/i586/curl-7.19.0-2.4mdvmes5.i586.rpm
 df37df4ef6884906620769cdb4c9cea2  mes5/i586/curl-examples-7.19.0-2.4mdvmes5.i586.rpm
 026cd500cff6a23fa2b06b6b56f26bec  mes5/i586/libcurl4-7.19.0-2.4mdvmes5.i586.rpm
 0c09fece31ee0445dd0fec878484708a  mes5/i586/libcurl-devel-7.19.0-2.4mdvmes5.i586.rpm 
 d102738ff3c559952c6dc6478dee0df4  mes5/SRPMS/curl-7.19.0-2.4mdvmes5.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 6ba687eea8c90ed431d53368de7f5576  mes5/x86_64/curl-7.19.0-2.4mdvmes5.x86_64.rpm
 12557f186c611d636ebb8a52ccff426a  mes5/x86_64/curl-examples-7.19.0-2.4mdvmes5.x86_64.rpm
 0466c50273c7db7b723777a58f5b4587  mes5/x86_64/lib64curl4-7.19.0-2.4mdvmes5.x86_64.rpm
 e198157d07ebaaf8b1413f370b1fae2c  mes5/x86_64/lib64curl-devel-7.19.0-2.4mdvmes5.x86_64.rpm 
 d102738ff3c559952c6dc6478dee0df4  mes5/SRPMS/curl-7.19.0-2.4mdvmes5.src.rpm

 Multi Network Firewall 2.0:
 27f87a6f0f1940d9b541c7f2e650603c  mnf/2.0/i586/curl-7.11.0-2.5.M20mdk.i586.rpm
 7d25724592e67047e35bb76b466dde5b  mnf/2.0/i586/libcurl2-7.11.0-2.5.M20mdk.i586.rpm
 c1d7e9ddaffe9a221a6ddea6e32d43ed  mnf/2.0/i586/libcurl2-devel-7.11.0-2.5.M20mdk.i586.rpm 
 ed5728fd99cef864100de142ee2039ff  mnf/2.0/SRPMS/curl-7.11.0-2.5.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Ottawa Linux Symposium: May get by with a little help from its friends
Black Hat 2014: How to crack just about everything
NSA Playset, 911 hacked and war cats: A wild ride at DEF CON 22
More Details of Onion/Critroni Crypto Ransomware Emerge
Is there Another NSA Leaker? Updated
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.