what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2023-3460-01

Red Hat Security Advisory 2023-3460-01
Posted Jun 6, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-3460-01 - The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Issues addressed include a denial of service vulnerability.

tags | advisory, web, denial of service, protocol
systems | linux, redhat
advisories | CVE-2022-32206, CVE-2023-23916
SHA-256 | 4f35d214f26f023db9755bcd3961524c8e3816178818ad49bdfc847516db4cee

Red Hat Security Advisory 2023-3460-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: curl security update
Advisory ID: RHSA-2023:3460-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3460
Issue date: 2023-06-06
CVE Names: CVE-2022-32206 CVE-2023-23916
=====================================================================

1. Summary:

An update for curl is now available for Red Hat Enterprise Linux 8.4
Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4
Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update
Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS AUS (v.8.4) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS E4S (v.8.4) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS TUS (v.8.4) - aarch64, ppc64le, s390x, x86_64

3. Description:

The curl packages provide the libcurl library and the curl utility for
downloading files from servers using various protocols, including HTTP,
FTP, and LDAP.

Security Fix(es):

* curl: HTTP compression denial of service (CVE-2022-32206)

* curl: HTTP multi-header compression denial of service (CVE-2023-23916)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2099300 - CVE-2022-32206 curl: HTTP compression denial of service
2167815 - CVE-2023-23916 curl: HTTP multi-header compression denial of service

6. Package List:

Red Hat Enterprise Linux BaseOS AUS (v.8.4):

Source:
curl-7.61.1-18.el8_4.3.src.rpm

aarch64:
curl-7.61.1-18.el8_4.3.aarch64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
curl-debugsource-7.61.1-18.el8_4.3.aarch64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-devel-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm

ppc64le:
curl-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debugsource-7.61.1-18.el8_4.3.ppc64le.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-devel-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm

s390x:
curl-7.61.1-18.el8_4.3.s390x.rpm
curl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
curl-debugsource-7.61.1-18.el8_4.3.s390x.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-7.61.1-18.el8_4.3.s390x.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-devel-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm

x86_64:
curl-7.61.1-18.el8_4.3.x86_64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
curl-debugsource-7.61.1-18.el8_4.3.i686.rpm
curl-debugsource-7.61.1-18.el8_4.3.x86_64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-7.61.1-18.el8_4.3.i686.rpm
libcurl-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-devel-7.61.1-18.el8_4.3.i686.rpm
libcurl-devel-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm

Red Hat Enterprise Linux BaseOS E4S (v.8.4):

Source:
curl-7.61.1-18.el8_4.3.src.rpm

aarch64:
curl-7.61.1-18.el8_4.3.aarch64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
curl-debugsource-7.61.1-18.el8_4.3.aarch64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-devel-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm

ppc64le:
curl-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debugsource-7.61.1-18.el8_4.3.ppc64le.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-devel-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm

s390x:
curl-7.61.1-18.el8_4.3.s390x.rpm
curl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
curl-debugsource-7.61.1-18.el8_4.3.s390x.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-7.61.1-18.el8_4.3.s390x.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-devel-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm

x86_64:
curl-7.61.1-18.el8_4.3.x86_64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
curl-debugsource-7.61.1-18.el8_4.3.i686.rpm
curl-debugsource-7.61.1-18.el8_4.3.x86_64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-7.61.1-18.el8_4.3.i686.rpm
libcurl-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-devel-7.61.1-18.el8_4.3.i686.rpm
libcurl-devel-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm

Red Hat Enterprise Linux BaseOS TUS (v.8.4):

Source:
curl-7.61.1-18.el8_4.3.src.rpm

aarch64:
curl-7.61.1-18.el8_4.3.aarch64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
curl-debugsource-7.61.1-18.el8_4.3.aarch64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-devel-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm

ppc64le:
curl-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debugsource-7.61.1-18.el8_4.3.ppc64le.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-devel-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm

s390x:
curl-7.61.1-18.el8_4.3.s390x.rpm
curl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
curl-debugsource-7.61.1-18.el8_4.3.s390x.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-7.61.1-18.el8_4.3.s390x.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-devel-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm

x86_64:
curl-7.61.1-18.el8_4.3.x86_64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
curl-debugsource-7.61.1-18.el8_4.3.i686.rpm
curl-debugsource-7.61.1-18.el8_4.3.x86_64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-7.61.1-18.el8_4.3.i686.rpm
libcurl-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-devel-7.61.1-18.el8_4.3.i686.rpm
libcurl-devel-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-32206
https://access.redhat.com/security/cve/CVE-2023-23916
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=KCBX
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close