Fedora Linux 8810 Published by

A curl security update has been released for Fedora 34.



SECURITY: Fedora 34 Update: curl-7.76.1-7.fc34


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-83fdddca0f
2021-07-23 01:03:07.021615
--------------------------------------------------------------------------------

Name : curl
Product : Fedora 34
Version : 7.76.1
Release : 7.fc34
URL :   https://curl.se/
Summary : A utility for getting files from remote servers (FTP, HTTP, and others)
Description :
curl is a command line tool for transferring data with URL syntax, supporting
FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,
SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP
uploading, HTTP form based upload, proxies, cookies, user+password
authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer
resume, proxy tunneling and a busload of other useful tricks.

--------------------------------------------------------------------------------
Update Information:

- fix TELNET stack contents disclosure again (CVE-2021-22925) - fix bad
connection reuse due to flawed path name checks (CVE-2021-22924) - disable
metalink support to fix the following vulnerabilities CVE-2021-22923 -
metalink download sends credentials CVE-2021-22922 - wrong content via
metalink not discarded
--------------------------------------------------------------------------------
ChangeLog:

--------------------------------------------------------------------------------
References:

[ 1 ] Bug #1984325 - CVE-2021-22922 curl: wrong content via metalink is not being discarded [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1984325
[ 2 ] Bug #1984326 - CVE-2021-22923 curl: Metalink download sends credentials [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1984326
[ 3 ] Bug #1984327 - CVE-2021-22924 curl: bad connection reuse due to flawed path name checks [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1984327
[ 4 ] Bug #1984328 - CVE-2021-22925 curl: Incorrect fix for CVE-2021-22898 TELNET stack contents disclosure [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1984328
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-83fdddca0f' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys