Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-28320

Опубликовано: 17 мая 2023
Источник: redhat
CVSS3: 3.7
EPSS Низкий

Описание

A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using alarm() and siglongjmp(). When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.

Отчет

This vulnerability does not affect versions of the curl package as shipped with Red Hat Enterprise Linux 6,7,8 and 9.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
.NET Core 3.1 on Red Hat Enterprise Linuxrh-dotnet31-curlOut of support scope
Red Hat Enterprise Linux 6curlOut of support scope
Red Hat Enterprise Linux 7curlNot affected
Red Hat Enterprise Linux 8curlNot affected
Red Hat Enterprise Linux 9curlNot affected
Red Hat JBoss Core ServicescurlAffected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-662
https://bugzilla.redhat.com/show_bug.cgi?id=2196783curl: siglongjmp race condition may lead to crash

EPSS

Процентиль: 70%
0.00641
Низкий

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 2 лет назад

A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.

CVSS3: 5.9
nvd
около 2 лет назад

A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.

CVSS3: 5.9
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 5.9
debian
около 2 лет назад

A denial of service vulnerability exists in curl <v8.1.0 in the way li ...

CVSS3: 5.9
github
около 2 лет назад

A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.

EPSS

Процентиль: 70%
0.00641
Низкий

3.7 Low

CVSS3