Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2023:4523

Опубликовано: 06 окт. 2023
Источник: rocky
Оценка: Moderate

Описание

Moderate: curl security update

The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

  • curl: GSS delegation too eager connection re-use (CVE-2023-27536)

  • curl: IDN wildcard match may lead to Improper Cerificate Validation (CVE-2023-28321)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
curlx86_6430.el8_8.3curl-7.61.1-30.el8_8.3.x86_64.rpm
libcurlx86_6430.el8_8.3libcurl-7.61.1-30.el8_8.3.x86_64.rpm
libcurl-develx86_6430.el8_8.3libcurl-devel-7.61.1-30.el8_8.3.x86_64.rpm
libcurl-minimalx86_6430.el8_8.3libcurl-minimal-7.61.1-30.el8_8.3.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
почти 2 года назад

ELSA-2023-4523: curl security update (MODERATE)

suse-cvrf
около 2 лет назад

Security update for curl

suse-cvrf
около 2 лет назад

Security update for curl

CVSS3: 5.9
ubuntu
больше 2 лет назад

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

CVSS3: 5.9
redhat
больше 2 лет назад

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.