vuln-list-alt/oval/c10f2/ALT-PU-2023-6260/definitions.json
2024-04-16 14:26:14 +00:00

131 lines
6.4 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20236260",
"Version": "oval:org.altlinux.errata:def:20236260",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-6260: package `curl` update to version 8.4.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f2"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-6260",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-6260",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-06576",
"RefURL": "https://bdu.fstec.ru/vul/2023-06576",
"Source": "BDU"
},
{
"RefID": "BDU:2023-06579",
"RefURL": "https://bdu.fstec.ru/vul/2023-06579",
"Source": "BDU"
},
{
"RefID": "CVE-2023-38545",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38545",
"Source": "CVE"
},
{
"RefID": "CVE-2023-38546",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38546",
"Source": "CVE"
}
],
"Description": "This update upgrades curl to version 8.4.0-alt1. \nSecurity Fix(es):\n\n * BDU:2023-06576: Уязвимость реализации протокола SOCKS5 утилиты командной строки cURL, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2023-06579: Уязвимость функции curl_easy_duphandle библиотеки libcurl, позволяющая нарушителю создать или перезаписать файлы cookie\n\n * CVE-2023-38545: This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \"let the host resolve the name\" could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.\n\n\n * CVE-2023-38546: This flaw allows an attacker to insert cookies at will into a running program\nusing libcurl, if the specific series of conditions are met.\n\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\nthat are the individual handles for single transfers.\n\nlibcurl provides a function call that duplicates en easy handle called\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\n\nIf a transfer has cookies enabled when the handle is duplicated, the\ncookie-enable state is also cloned - but without cloning the actual\ncookies. If the source handle did not read any cookies from a specific file on\ndisk, the cloned version of the handle would instead store the file name as\n`none` (using the four ASCII letters, no quotes).\n\nSubsequent use of the cloned handle that does not explicitly set a source to\nload cookies from would then inadvertently load cookies from a file named\n`none` - if such a file exists and is readable in the current directory of the\nprogram using libcurl. And if using the correct file format of course.\n",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-10-16"
},
"Updated": {
"Date": "2023-10-16"
},
"BDUs": [
{
"ID": "BDU:2023-06576",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-122",
"Href": "https://bdu.fstec.ru/vul/2023-06576",
"Impact": "High",
"Public": "20230930"
},
{
"ID": "BDU:2023-06579",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-73",
"Href": "https://bdu.fstec.ru/vul/2023-06579",
"Impact": "Low",
"Public": "20231011"
}
],
"CVEs": [
{
"ID": "CVE-2023-38545",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38545",
"Impact": "Critical",
"Public": "20231018"
},
{
"ID": "CVE-2023-38546",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38546",
"Impact": "Low",
"Public": "20231018"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:5001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20236260001",
"Comment": "curl is earlier than 0:8.4.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20236260002",
"Comment": "libcurl is earlier than 0:8.4.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20236260003",
"Comment": "libcurl-devel is earlier than 0:8.4.0-alt1"
}
]
}
]
}
}
]
}