MGASA-2015-0263

Source
https://advisories.mageia.org/MGASA-2015-0263.html
Import Source
https://advisories.mageia.org/MGASA-2015-0263.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0263
Related
Published
2015-07-05T17:22:03Z
Modified
2015-07-09T07:56:53Z
Summary
Updated curl package fixes security vulnerability
Details

libcurl can wrongly send HTTP credentials when re-using connections. Even if the handle for an HTTP connection is reset, it retains the credentials, which can cause them to be unintentionally leaked in subsequent requests (CVE-2015-3236).

libcurl can get tricked by a malicious SMB server to send off data it did not intend to. A malicious SMB server can use this to access arbitrary process memory, or to crash the client, causing a denial of service (CVE-2015-3237).

References
Credits

Affected packages

Mageia:5 / curl

Package

Name
curl
Purl
pkg:rpm/mageia/curl?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.40.0-3.1.mga5

Ecosystem specific

{
    "section": "core"
}