FEDORA-2016-89769648a0 created by kdudka 3 years ago for Fedora 25
stable
  • fix cookie injection for other servers (CVE-2016-8615)
  • compare user/passwd case-sensitively while reusing connections (CVE-2016-8616)
  • base64: check for integer overflow on large input (CVE-2016-8617)
  • fix double-free in krb5 code (CVE-2016-8619)
  • fix double-free in curl_maprintf() (CVE-2016-8618)
  • fix glob parser write/read out of bounds (CVE-2016-8620)
  • fix out-of-bounds read in curl_getdate() (CVE-2016-8621)
  • fix URL unescape heap overflow via integer truncation (CVE-2016-8622)
  • fix use-after-free via shared cookies (CVE-2016-8623)
  • urlparse: accept '#' as end of host name (CVE-2016-8624)

How to install

sudo dnf upgrade --advisory=FEDORA-2016-89769648a0
This update has been submitted for testing by kdudka. 3 years ago
User Icon yselkowitz commented & provided feedback 3 years ago

Please also consider testing https://bodhi.fedoraproject.org/updates/FEDORA-2016-6918573b8c, in which libpsl switches from libidn to libidn2 to match this update.

This update has been pushed to testing. 3 years ago
User Icon filiperosset commented & provided feedback 3 years ago
karma

no regressions noted

User Icon besser82 commented & provided feedback 3 years ago
karma

Works great! LGTM! =)

This update has been submitted for stable by bodhi. 3 years ago
User Icon lupinix commented & provided feedback 3 years ago
karma

works

This update has been pushed to stable. 2 years ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
3
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Dates
submitted
3 years ago
in testing
3 years ago
in stable
2 years ago
BZ#1390894 CVE-2016-8615 CVE-2016-8616 CVE-2016-8617 CVE-2016-8618 CVE-2016-8619 CVE-2016-8620 CVE-2016-8621 CVE-2016-8622 CVE-2016-8623 CVE-2016-8624 curl: various flaws [fedora-all]
0
0

Automated Test Results