what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-062

Mandriva Linux Security Advisory 2010-062
Posted Mar 20, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-062 - content_encoding.c in libcurl 7.10.5 through 7.19.7, when zlib is enabled, does not properly restrict the amount of callback data sent to an application that requests automatic decompression, which might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact by sending crafted compressed data to an application that relies on the intended data-length limit. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2010-0734
SHA-256 | 58ab456ef3b6e21faeeec558af717d64962365c6f7c1fdceeb7c5f8b5e30482d

Mandriva Linux Security Advisory 2010-062

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:062
http://www.mandriva.com/security/
_______________________________________________________________________

Package : curl
Date : March 19, 2010
Affected: 2008.0, 2009.0, 2009.1, 2010.0, Corporate 4.0,
Enterprise Server 5.0, Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in curl:

content_encoding.c in libcurl 7.10.5 through 7.19.7, when zlib is
enabled, does not properly restrict the amount of callback data sent
to an application that requests automatic decompression, which might
allow remote attackers to cause a denial of service (application
crash) or have unspecified other impact by sending crafted compressed
data to an application that relies on the intended data-length limit
(CVE-2010-0734).

Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.

The updated packages have been patched to correct theis issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
3b9700f3becc35f9479762f8d8118005 2008.0/i586/curl-7.16.4-2.3mdv2008.0.i586.rpm
58edc5e841606c3501beeddc71309a44 2008.0/i586/libcurl4-7.16.4-2.3mdv2008.0.i586.rpm
1c5d61cb13b75182ea24e1eb91ea9022 2008.0/i586/libcurl-devel-7.16.4-2.3mdv2008.0.i586.rpm
91f4758aac7a219f91963ce076fb8e08 2008.0/SRPMS/curl-7.16.4-2.3mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
59dda0d139c914b0764a1525aedd9e2b 2008.0/x86_64/curl-7.16.4-2.3mdv2008.0.x86_64.rpm
ce13767698748c5d509e8fd6823b16cf 2008.0/x86_64/lib64curl4-7.16.4-2.3mdv2008.0.x86_64.rpm
3d7463fc2250204ed0b4a88c5d981901 2008.0/x86_64/lib64curl-devel-7.16.4-2.3mdv2008.0.x86_64.rpm
91f4758aac7a219f91963ce076fb8e08 2008.0/SRPMS/curl-7.16.4-2.3mdv2008.0.src.rpm

Mandriva Linux 2009.0:
8cdbd92df1a130ba9dcb2b18cc3b97a2 2009.0/i586/curl-7.19.0-2.4mdv2009.0.i586.rpm
06be4cf361e00458ca9f6f6448bfd1aa 2009.0/i586/curl-examples-7.19.0-2.4mdv2009.0.i586.rpm
862148fd41195d65dd7dbdcc5a1a0d3c 2009.0/i586/libcurl4-7.19.0-2.4mdv2009.0.i586.rpm
3c32ba7af388e7351ee0cb963a803443 2009.0/i586/libcurl-devel-7.19.0-2.4mdv2009.0.i586.rpm
5569a1c539f8cd5639f568a46e7736e0 2009.0/SRPMS/curl-7.19.0-2.4mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
2bc00188f2f8823f00899edfaf6f1950 2009.0/x86_64/curl-7.19.0-2.4mdv2009.0.x86_64.rpm
c1443c8c88cf182b593c3a3c523f77b6 2009.0/x86_64/curl-examples-7.19.0-2.4mdv2009.0.x86_64.rpm
16dc3853657e667545bc20af1e7436bb 2009.0/x86_64/lib64curl4-7.19.0-2.4mdv2009.0.x86_64.rpm
3cad511e60155ed7ad4b1076e66e58f5 2009.0/x86_64/lib64curl-devel-7.19.0-2.4mdv2009.0.x86_64.rpm
5569a1c539f8cd5639f568a46e7736e0 2009.0/SRPMS/curl-7.19.0-2.4mdv2009.0.src.rpm

Mandriva Linux 2009.1:
15a8fde0e07a6ac7e4e09bbad25d33dd 2009.1/i586/curl-7.19.4-1.1mdv2009.1.i586.rpm
89207880380ba85543bd13e145199b71 2009.1/i586/curl-examples-7.19.4-1.1mdv2009.1.i586.rpm
b49e88d047d05ef28e1d1d4452a1808d 2009.1/i586/libcurl4-7.19.4-1.1mdv2009.1.i586.rpm
80477218d684b9e43e6e8adb1f2f3e50 2009.1/i586/libcurl-devel-7.19.4-1.1mdv2009.1.i586.rpm
16bb01108d6dda2be2495e45c2669958 2009.1/SRPMS/curl-7.19.4-1.1mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
acce92bd77632cff44d681d4de8481ab 2009.1/x86_64/curl-7.19.4-1.1mdv2009.1.x86_64.rpm
1517c5562a4fe98d8a09ca3e81abd4f1 2009.1/x86_64/curl-examples-7.19.4-1.1mdv2009.1.x86_64.rpm
0946b748e6b23013cb68db4748b3e731 2009.1/x86_64/lib64curl4-7.19.4-1.1mdv2009.1.x86_64.rpm
60566c2bbc2ea405b48830b54ec6189f 2009.1/x86_64/lib64curl-devel-7.19.4-1.1mdv2009.1.x86_64.rpm
16bb01108d6dda2be2495e45c2669958 2009.1/SRPMS/curl-7.19.4-1.1mdv2009.1.src.rpm

Mandriva Linux 2010.0:
ecd86c44d5f8aaff8c9c2361d9f3896b 2010.0/i586/curl-7.19.6-3.1mdv2010.0.i586.rpm
89d8674862c81e9188758b81fa4b2121 2010.0/i586/curl-examples-7.19.6-3.1mdv2010.0.i586.rpm
5090bbf68e7ded8ef1e67845c13f28ab 2010.0/i586/libcurl4-7.19.6-3.1mdv2010.0.i586.rpm
e545ee4b79873bfeeccb73ec166b6536 2010.0/i586/libcurl-devel-7.19.6-3.1mdv2010.0.i586.rpm
cef8204400fc2780819f929e0d664ea1 2010.0/SRPMS/curl-7.19.6-3.1mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
02f4d1ee6459c06bc51c43ef1ae7dc7a 2010.0/x86_64/curl-7.19.6-3.1mdv2010.0.x86_64.rpm
4417f2b6a5d0f5a8ebfbed90e524f5ac 2010.0/x86_64/curl-examples-7.19.6-3.1mdv2010.0.x86_64.rpm
dd05912726d564c779c3c890ff537b07 2010.0/x86_64/lib64curl4-7.19.6-3.1mdv2010.0.x86_64.rpm
10c8dc60a6c64c22a7f8dbd100955c9e 2010.0/x86_64/lib64curl-devel-7.19.6-3.1mdv2010.0.x86_64.rpm
cef8204400fc2780819f929e0d664ea1 2010.0/SRPMS/curl-7.19.6-3.1mdv2010.0.src.rpm

Corporate 4.0:
75f31c808f0fe1d04a1919a50c3950ae corporate/4.0/i586/curl-7.14.0-2.5.20060mlcs4.i586.rpm
8709d1eab88253ad429fbef0cf6a4af0 corporate/4.0/i586/libcurl3-7.14.0-2.5.20060mlcs4.i586.rpm
d72194e4561e0621497dcc605e6d3fd4 corporate/4.0/i586/libcurl3-devel-7.14.0-2.5.20060mlcs4.i586.rpm
783cf9616effb3ca339b557f55f78f8f corporate/4.0/SRPMS/curl-7.14.0-2.5.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
1e4d26e8f0b3ab500e25065f1d11e490 corporate/4.0/x86_64/curl-7.14.0-2.5.20060mlcs4.x86_64.rpm
adcfc892f29fd43810f1f808dc51548e corporate/4.0/x86_64/lib64curl3-7.14.0-2.5.20060mlcs4.x86_64.rpm
f25c93fe73f19a7f4669541926e11c49 corporate/4.0/x86_64/lib64curl3-devel-7.14.0-2.5.20060mlcs4.x86_64.rpm
783cf9616effb3ca339b557f55f78f8f corporate/4.0/SRPMS/curl-7.14.0-2.5.20060mlcs4.src.rpm

Mandriva Enterprise Server 5:
3f8eea4f36bee7a06c0f7c063fe920a7 mes5/i586/curl-7.19.0-2.4mdvmes5.i586.rpm
df37df4ef6884906620769cdb4c9cea2 mes5/i586/curl-examples-7.19.0-2.4mdvmes5.i586.rpm
026cd500cff6a23fa2b06b6b56f26bec mes5/i586/libcurl4-7.19.0-2.4mdvmes5.i586.rpm
0c09fece31ee0445dd0fec878484708a mes5/i586/libcurl-devel-7.19.0-2.4mdvmes5.i586.rpm
d102738ff3c559952c6dc6478dee0df4 mes5/SRPMS/curl-7.19.0-2.4mdvmes5.src.rpm

Mandriva Enterprise Server 5/X86_64:
6ba687eea8c90ed431d53368de7f5576 mes5/x86_64/curl-7.19.0-2.4mdvmes5.x86_64.rpm
12557f186c611d636ebb8a52ccff426a mes5/x86_64/curl-examples-7.19.0-2.4mdvmes5.x86_64.rpm
0466c50273c7db7b723777a58f5b4587 mes5/x86_64/lib64curl4-7.19.0-2.4mdvmes5.x86_64.rpm
e198157d07ebaaf8b1413f370b1fae2c mes5/x86_64/lib64curl-devel-7.19.0-2.4mdvmes5.x86_64.rpm
d102738ff3c559952c6dc6478dee0df4 mes5/SRPMS/curl-7.19.0-2.4mdvmes5.src.rpm

Multi Network Firewall 2.0:
27f87a6f0f1940d9b541c7f2e650603c mnf/2.0/i586/curl-7.11.0-2.5.M20mdk.i586.rpm
7d25724592e67047e35bb76b466dde5b mnf/2.0/i586/libcurl2-7.11.0-2.5.M20mdk.i586.rpm
c1d7e9ddaffe9a221a6ddea6e32d43ed mnf/2.0/i586/libcurl2-devel-7.11.0-2.5.M20mdk.i586.rpm
ed5728fd99cef864100de142ee2039ff mnf/2.0/SRPMS/curl-7.11.0-2.5.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLo/D0mqjQ0CJFipgRAhgEAKCQunr2q6HysglXPmluTn2QQqz7ngCcDiKX
RtR93loskahsQKDwC/Bqq7I=
=Iv6E
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close