MGASA-2014-0385

Source
https://advisories.mageia.org/MGASA-2014-0385.html
Import Source
https://advisories.mageia.org/MGASA-2014-0385.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0385
Related
Published
2014-09-24T16:44:28Z
Modified
2014-09-24T16:27:41Z
Summary
Updated curl packages fix security vulnerabilities
Details

Updated curl packages fix security vulnerabilities:

In cURL before 7.38.0, libcurl can be fooled to both sending cookies to wrong sites and into allowing arbitrary sites to set cookies for others. For this problem to trigger, the client application must use the numerical IP address in the URL to access the site (CVE-2014-3613).

In cURL before 7.38.0, libcurl wrongly allows cookies to be set for Top Level Domains (TLDs), thus making them apply broader than cookies are allowed. This can allow arbitrary sites to set cookies that then would get sent to a different and unrelated site or domain (CVE-2014-3620).

References
Credits

Affected packages

Mageia:4 / curl

Package

Name
curl
Purl
pkg:rpm/mageia/curl?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.34.0-1.3.mga4

Ecosystem specific

{
    "section": "core"
}