curl-7.61.1-33.el8_9.5

エラータID: AXSA:2024-7656:02

Release date: 
Thursday, April 4, 2024 - 18:00
Subject: 
curl-7.61.1-33.el8_9.5
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: information disclosure by exploiting a mixed case flaw (CVE-2023-46218)
* curl: more POST-after-PUT confusion (CVE-2023-28322)
* curl: cookie injection with none file (CVE-2023-38546)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* libssh (curl sftp) not trying password auth (BZ#2240033)
* libssh: cap SFTP packet size sent (RHEL-5485)

CVE-2023-28322
An information disclosure vulnerability exists in curl https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program using libcurl. And if using the correct file format of course.
CVE-2023-46218
This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. curl-7.61.1-33.el8_9.5.src.rpm
    MD5: e56ae3eee576ae72e669df746ca43f7a
    SHA-256: 0bca4ca1054e43dd4d76ccf020b7740b032ad0dca1b0781ce17c7414dce448c7
    Size: 2.50 MB

Asianux Server 8 for x86_64
  1. curl-7.61.1-33.el8_9.5.x86_64.rpm
    MD5: a5f63c10fd09b1edcdfc3e535a974717
    SHA-256: 657580a1d44da61bbce9af25d9f3f2df70f524e2e0251f909ed784e8bee523d9
    Size: 352.67 kB
  2. libcurl-7.61.1-33.el8_9.5.i686.rpm
    MD5: c0eb1a4c7a878745ddb53761dbbac8d2
    SHA-256: 1d4e178a24f690e90f2c5dd85d911980edd8c0439ca57fd037cd2cb8986ad862
    Size: 330.83 kB
  3. libcurl-7.61.1-33.el8_9.5.x86_64.rpm
    MD5: cf57f08b99c8335af7c238ee2bede3e8
    SHA-256: 4144bc775ec767d4bd485ea4ffb5aa330d2ea8a7fefa385091299ad3710750bf
    Size: 302.93 kB
  4. libcurl-devel-7.61.1-33.el8_9.5.i686.rpm
    MD5: 0672c74a4d52fcd78d3e0ae25ae70042
    SHA-256: 8e3ada322784f8eadc388c19cc11e34321b3c22f9bd3aaec90790b12fd7a4ec3
    Size: 834.94 kB
  5. libcurl-devel-7.61.1-33.el8_9.5.x86_64.rpm
    MD5: 56ceec968287fbf816df4fdde87e6aa2
    SHA-256: 7548017308c9cc4259dd5be33b441bad2edf20f0bb9300adf7431adcc5097394
    Size: 834.90 kB
  6. libcurl-minimal-7.61.1-33.el8_9.5.i686.rpm
    MD5: a309dd2bbc9e7ef1de8a349a9a87cb09
    SHA-256: a625ecba12b3752020fc09c131a713e7c4135af2d4fca657bbf52362ea4b0ec6
    Size: 315.93 kB
  7. libcurl-minimal-7.61.1-33.el8_9.5.x86_64.rpm
    MD5: 73d28a65517123825ef2322eddd45db4
    SHA-256: 00440377d7f643ab447c6cfc2606d1d89c9482970cf045befcdc30fb5c0aab66
    Size: 289.24 kB