Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:2230-1

Опубликовано: 17 мая 2023
Источник: suse-cvrf

Описание

Security update for curl

This update for curl fixes the following issues:

  • CVE-2023-28320: Fixed siglongjmp race condition (bsc#1211231).
  • CVE-2023-28321: Fixed IDN wildcard matching (bsc#1211232).
  • CVE-2023-28322: Fixed POST-after-PUT confusion (bsc#1211233).

Список пакетов

SUSE Linux Enterprise Server 12 SP2-BCL
curl-7.37.0-37.98.1
libcurl4-7.37.0-37.98.1
libcurl4-32bit-7.37.0-37.98.1

Описание

A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:curl-7.37.0-37.98.1
SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-32bit-7.37.0-37.98.1
SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-7.37.0-37.98.1

Ссылки

Описание

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:curl-7.37.0-37.98.1
SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-32bit-7.37.0-37.98.1
SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-7.37.0-37.98.1

Ссылки

Описание

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:curl-7.37.0-37.98.1
SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-32bit-7.37.0-37.98.1
SUSE Linux Enterprise Server 12 SP2-BCL:libcurl4-7.37.0-37.98.1

Ссылки