Описание
Security update for curl
This update for curl fixes the following issues:
- CVE-2024-7264: Fixed ASN.1 date parser overread (bsc#1228535)
- CVE-2024-6197: Fixed freeing stack buffer in utf8asn1str (bsc#1227888)
Список пакетов
Container bci/bci-sle15-kernel-module-devel:15.7
Container bci/bci-sle15-kernel-module-devel:latest
Container bci/gcc:latest
Container bci/golang:1.22-openssl
Container bci/golang:1.23
Container bci/golang:latest
Container bci/kiwi:latest
Container bci/node:22
Container bci/nodejs:latest
Container bci/openjdk:17
Container bci/openjdk:latest
Container bci/php-apache:latest
Container bci/php-fpm:latest
Container bci/php:latest
Container bci/python:3
Container bci/python:3.13
Container bci/python:latest
Container bci/ruby:3
Container bci/ruby:latest
Container bci/rust:1.84
Container bci/rust:latest
Container bci/spack:0.23
Container bci/spack:latest
Container containers/apache-pulsar:3.3
Container containers/milvus:2.4
Container containers/open-webui:0
Container containers/python:3.11
Container containers/python:3.9
Container containers/pytorch:2-nvidia
Container containers/pytorch:2.5.0
Container suse/git:latest
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest
Container suse/manager/5.0/x86_64/proxy-httpd:latest
Container suse/manager/5.0/x86_64/proxy-salt-broker:latest
Container suse/manager/5.0/x86_64/server-hub-xmlrpc-api:latest
Container suse/manager/5.0/x86_64/server:latest
Container suse/sle15:15.6
Container suse/sle15:15.7
Container suse/sles/15.7/cdi-cloner:1.58.0
Container suse/sles/15.7/cdi-importer:1.58.0
Container suse/sles/15.7/cdi-uploadserver:1.58.0
Container suse/sles/15.7/libguestfs-tools:1.4.0
Container suse/sles/15.7/virt-handler:1.4.0
Container suse/sles/15.7/virt-launcher:1.4.0
Container trento/trento-wanda:latest
Container trento/trento-web:latest
Image SLES15-SP6
Image SLES15-SP6-Azure-Basic
Image SLES15-SP6-Azure-Standard
Image SLES15-SP6-BYOS
Image SLES15-SP6-BYOS-Azure
Image SLES15-SP6-BYOS-EC2
Image SLES15-SP6-BYOS-GCE
Image SLES15-SP6-CHOST-BYOS
Image SLES15-SP6-CHOST-BYOS-Aliyun
Image SLES15-SP6-CHOST-BYOS-Azure
Image SLES15-SP6-CHOST-BYOS-EC2
Image SLES15-SP6-CHOST-BYOS-GCE
Image SLES15-SP6-CHOST-BYOS-GDC
Image SLES15-SP6-CHOST-BYOS-SAP-CCloud
Image SLES15-SP6-EC2
Image SLES15-SP6-EC2-ECS-HVM
Image SLES15-SP6-GCE
Image SLES15-SP6-HPC
Image SLES15-SP6-HPC-Azure
Image SLES15-SP6-HPC-BYOS
Image SLES15-SP6-HPC-BYOS-Azure
Image SLES15-SP6-HPC-BYOS-EC2
Image SLES15-SP6-HPC-BYOS-GCE
Image SLES15-SP6-HPC-EC2
Image SLES15-SP6-HPC-GCE
Image SLES15-SP6-Hardened-BYOS
Image SLES15-SP6-Hardened-BYOS-Azure
Image SLES15-SP6-Hardened-BYOS-EC2
Image SLES15-SP6-Hardened-BYOS-GCE
Image SLES15-SP6-SAP
Image SLES15-SP6-SAP-Azure
Image SLES15-SP6-SAP-Azure-LI-BYOS
Image SLES15-SP6-SAP-Azure-LI-BYOS-Production
Image SLES15-SP6-SAP-Azure-VLI-BYOS
Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP6-SAP-BYOS
Image SLES15-SP6-SAP-BYOS-Azure
Image SLES15-SP6-SAP-BYOS-EC2
Image SLES15-SP6-SAP-BYOS-GCE
Image SLES15-SP6-SAP-EC2
Image SLES15-SP6-SAP-GCE
Image SLES15-SP6-SAP-Hardened
Image SLES15-SP6-SAP-Hardened-Azure
Image SLES15-SP6-SAP-Hardened-BYOS
Image SLES15-SP6-SAP-Hardened-BYOS-Azure
Image SLES15-SP6-SAP-Hardened-BYOS-EC2
Image SLES15-SP6-SAP-Hardened-BYOS-GCE
Image SLES15-SP6-SAP-Hardened-EC2
Image SLES15-SP6-SAP-Hardened-GCE
Image SLES15-SP6-SAPCAL
Image SLES15-SP6-SAPCAL-Azure
Image SLES15-SP6-SAPCAL-EC2
Image SLES15-SP6-SAPCAL-GCE
Image ai_15_6
Image proxy-httpd-image
Image proxy-salt-broker-image
Image python_15_6
Image server-hub-xmlrpc-api-image
Image server-image
SUSE Linux Enterprise Module for Basesystem 15 SP6
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2024:2784-1
- E-Mail link for SUSE-SU-2024:2784-1
- SUSE Security Ratings
- SUSE Bug 1227888
- SUSE Bug 1228535
- SUSE CVE CVE-2024-6197 page
- SUSE CVE CVE-2024-7264 page
Описание
libcurl's ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. Unfortunately, when doing so it also invokes `free()` on a 4 byte localstack buffer. Most modern malloc implementations detect this error and immediately abort. Some however accept the input pointer and add that memory to its list of available chunks. This leads to the overwriting of nearby stack memory. The content of the overwrite is decided by the `free()` implementation; likely to be memory pointers and a set of flags. The most likely outcome of exploting this flaw is a crash, although it cannot be ruled out that more serious results can be had in special circumstances.
Затронутые продукты
Ссылки
- CVE-2024-6197
- SUSE Bug 1227888
Описание
libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.
Затронутые продукты
Ссылки
- CVE-2024-7264
- SUSE Bug 1228535