stable

curl-7.76.1-12.fc34

FEDORA-2021-c5584b92d4 created by kdudka 3 years ago for Fedora 34
  • CVE-2021-22947 - STARTTLS protocol injection via MITM
  • CVE-2021-22946 - protocol downgrade required TLS bypassed
  • CVE-2021-22945 - use-after-free and double-free in MQTT sending

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2021-c5584b92d4

This update has been submitted for testing by kdudka.

3 years ago

This update's test gating status has been changed to 'failed'.

3 years ago

This update's test gating status has been changed to 'waiting'.

3 years ago

This update's test gating status has been changed to 'failed'.

3 years ago

This update's test gating status has been changed to 'passed'.

3 years ago

This update has been pushed to testing.

3 years ago
User Icon bojan commented & provided feedback 3 years ago
karma

Works.

User Icon ibims provided feedback 3 years ago
karma

This update can be pushed to stable now if the maintainer wishes

3 years ago
User Icon jpbn commented & provided feedback 3 years ago
karma

OK

This update has been submitted for stable by bodhi.

3 years ago
User Icon kdudka commented & provided feedback 3 years ago

Thank you for testing the update!

karma

This update has been pushed to stable.

3 years ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
4
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
14 days
Dates
submitted
3 years ago
in testing
3 years ago
in stable
3 years ago
BZ#2004362 CVE-2021-22945 curl: use-after-free and double-free in MQTT sending [fedora-all]
0
0
BZ#2004363 CVE-2021-22947 curl: STARTTLS protocol injection via MITM [fedora-all]
0
0
BZ#2004927 CVE-2021-22946 curl: protocol downgrade required TLS bypassed [fedora-all]
0
0

Automated Test Results