{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2024:1601","synopsis":"Moderate: curl security and bug fix update","severity":"SEVERITY_MODERATE","topic":"An update is available for curl.\nThis update affects Rocky Linux 8.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list","description":"The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.\n\nSecurity Fix(es):\n\n* curl: information disclosure by exploiting a mixed case flaw (CVE-2023-46218)\n\n* curl: more POST-after-PUT confusion (CVE-2023-28322)\n\n* curl: cookie injection with none file (CVE-2023-38546)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* libssh (curl sftp) not trying password auth (BZ#2240033)\n\n* libssh: cap SFTP packet size sent (Rocky Linux-5485)","solution":null,"affectedProducts":["Rocky Linux 8"],"fixes":[{"ticket":"2196793","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2196793","description":""},{"ticket":"2240033","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2240033","description":"* libssh (curl sftp) not trying password auth"},{"ticket":"2241938","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2241938","description":""},{"ticket":"2252030","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2252030","description":""}],"cves":[{"name":"CVE-2023-28322","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-28322","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"},{"name":"CVE-2023-38546","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-38546","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"},{"name":"CVE-2023-46218","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-46218","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"}],"references":[],"publishedAt":"2024-04-05T14:55:53.600745Z","rpms":{"Rocky Linux 8":{"nvras":["curl-0:7.61.1-33.el8_9.5.aarch64.rpm","curl-0:7.61.1-33.el8_9.5.src.rpm","curl-0:7.61.1-33.el8_9.5.x86_64.rpm","curl-debuginfo-0:7.61.1-33.el8_9.5.aarch64.rpm","curl-debuginfo-0:7.61.1-33.el8_9.5.i686.rpm","curl-debuginfo-0:7.61.1-33.el8_9.5.x86_64.rpm","curl-debugsource-0:7.61.1-33.el8_9.5.aarch64.rpm","curl-debugsource-0:7.61.1-33.el8_9.5.i686.rpm","curl-debugsource-0:7.61.1-33.el8_9.5.x86_64.rpm","libcurl-0:7.61.1-33.el8_9.5.aarch64.rpm","libcurl-0:7.61.1-33.el8_9.5.i686.rpm","libcurl-0:7.61.1-33.el8_9.5.x86_64.rpm","libcurl-debuginfo-0:7.61.1-33.el8_9.5.aarch64.rpm","libcurl-debuginfo-0:7.61.1-33.el8_9.5.i686.rpm","libcurl-debuginfo-0:7.61.1-33.el8_9.5.x86_64.rpm","libcurl-devel-0:7.61.1-33.el8_9.5.aarch64.rpm","libcurl-devel-0:7.61.1-33.el8_9.5.i686.rpm","libcurl-devel-0:7.61.1-33.el8_9.5.x86_64.rpm","libcurl-minimal-0:7.61.1-33.el8_9.5.aarch64.rpm","libcurl-minimal-0:7.61.1-33.el8_9.5.i686.rpm","libcurl-minimal-0:7.61.1-33.el8_9.5.x86_64.rpm","libcurl-minimal-debuginfo-0:7.61.1-33.el8_9.5.aarch64.rpm","libcurl-minimal-debuginfo-0:7.61.1-33.el8_9.5.i686.rpm","libcurl-minimal-debuginfo-0:7.61.1-33.el8_9.5.x86_64.rpm"]}},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2024:1601 curl security and bug fix update

April 5, 2024
An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list

Summary

An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list


The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: information disclosure by exploiting a mixed case flaw (CVE-2023-46218) * curl: more POST-after-PUT confusion (CVE-2023-28322) * curl: cookie injection with none file (CVE-2023-38546) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libssh (curl sftp) not trying password auth (BZ#2240033) * libssh: cap SFTP packet size sent (Rocky Linux-5485)

RPMs

curl-0:7.61.1-33.el8_9.5.aarch64.rpm

curl-0:7.61.1-33.el8_9.5.src.rpm

curl-0:7.61.1-33.el8_9.5.x86_64.rpm

curl-debuginfo-0:7.61.1-33.el8_9.5.aarch64.rpm

curl-debuginfo-0:7.61.1-33.el8_9.5.i686.rpm

curl-debuginfo-0:7.61.1-33.el8_9.5.x86_64.rpm

curl-debugsource-0:7.61.1-33.el8_9.5.aarch64.rpm

curl-debugsource-0:7.61.1-33.el8_9.5.i686.rpm

curl-debugsource-0:7.61.1-33.el8_9.5.x86_64.rpm

libcurl-0:7.61.1-33.el8_9.5.aarch64.rpm

libcurl-0:7.61.1-33.el8_9.5.i686.rpm

libcurl-0:7.61.1-33.el8_9.5.x86_64.rpm

libcurl-debuginfo-0:7.61.1-33.el8_9.5.aarch64.rpm

libcurl-debuginfo-0:7.61.1-33.el8_9.5.i686.rpm

libcurl-debuginfo-0:7.61.1-33.el8_9.5.x86_64.rpm

libcurl-devel-0:7.61.1-33.el8_9.5.aarch64.rpm

libcurl-devel-0:7.61.1-33.el8_9.5.i686.rpm

libcurl-devel-0:7.61.1-33.el8_9.5.x86_64.rpm

libcurl-minimal-0:7.61.1-33.el8_9.5.aarch64.rpm

libcurl-minimal-0:7.61.1-33.el8_9.5.i686.rpm

libcurl-minimal-0:7.61.1-33.el8_9.5.x86_64.rpm

libcurl-minimal-debuginfo-0:7.61.1-33.el8_9.5.aarch64.rpm

libcurl-minimal-debuginfo-0:7.61.1-33.el8_9.5.i686.rpm

libcurl-minimal-debuginfo-0:7.61.1-33.el8_9.5.x86_64.rpm

References

No References

CVEs

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218

Severity
Name: RLSA-2024:1601
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=2196793

https://bugzilla.redhat.com/show_bug.cgi?id=2240033

https://bugzilla.redhat.com/show_bug.cgi?id=2241938

https://bugzilla.redhat.com/show_bug.cgi?id=2252030


Related News