Fedora Linux 8782 Published by

A curl security update has been released for Fedora 33.



SECURITY: Fedora 33 Update: curl-7.71.1-11.fc33


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-fc96a3a749
2021-10-02 01:09:40.654419
--------------------------------------------------------------------------------

Name : curl
Product : Fedora 33
Version : 7.71.1
Release : 11.fc33
URL :   https://curl.haxx.se/
Summary : A utility for getting files from remote servers (FTP, HTTP, and others)
Description :
curl is a command line tool for transferring data with URL syntax, supporting
FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,
SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP
uploading, HTTP form based upload, proxies, cookies, user+password
authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer
resume, proxy tunneling and a busload of other useful tricks.

--------------------------------------------------------------------------------
Update Information:

- CVE-2021-22947 - STARTTLS protocol injection via MITM - CVE-2021-22946 -
protocol downgrade required TLS bypassed - CVE-2021-22945 - use-after-free and
double-free in MQTT sending
--------------------------------------------------------------------------------
ChangeLog:

* Fri Sep 17 2021 Kamil Dudka - 7.71.1-11
- fix STARTTLS protocol injection via MITM (CVE-2021-22947)
- fix protocol downgrade required TLS bypass (CVE-2021-22946)
- fix use-after-free and double-free in MQTT sending (CVE-2021-22945)
* Wed Jul 21 2021 Kamil Dudka - 7.71.1-10
- fix TELNET stack contents disclosure again (CVE-2021-22925)
- fix TELNET stack contents disclosure (CVE-2021-22898)
- fix bad connection reuse due to flawed path name checks (CVE-2021-22924)
- disable metalink support to fix the following vulnerabilities
CVE-2021-22923 - metalink download sends credentials
CVE-2021-22922 - wrong content via metalink not discarded
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2004362 - CVE-2021-22945 curl: use-after-free and double-free in MQTT sending [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2004362
[ 2 ] Bug #2004363 - CVE-2021-22947 curl: STARTTLS protocol injection via MITM [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2004363
[ 3 ] Bug #2004927 - CVE-2021-22946 curl: protocol downgrade required TLS bypassed [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2004927
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-fc96a3a749' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys