exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2023-3460-01

Red Hat Security Advisory 2023-3460-01
Posted Jun 6, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-3460-01 - The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Issues addressed include a denial of service vulnerability.

tags | advisory, web, denial of service, protocol
systems | linux, redhat
advisories | CVE-2022-32206, CVE-2023-23916
SHA-256 | 4f35d214f26f023db9755bcd3961524c8e3816178818ad49bdfc847516db4cee

Red Hat Security Advisory 2023-3460-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: curl security update
Advisory ID: RHSA-2023:3460-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3460
Issue date: 2023-06-06
CVE Names: CVE-2022-32206 CVE-2023-23916
=====================================================================

1. Summary:

An update for curl is now available for Red Hat Enterprise Linux 8.4
Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4
Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update
Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS AUS (v.8.4) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS E4S (v.8.4) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS TUS (v.8.4) - aarch64, ppc64le, s390x, x86_64

3. Description:

The curl packages provide the libcurl library and the curl utility for
downloading files from servers using various protocols, including HTTP,
FTP, and LDAP.

Security Fix(es):

* curl: HTTP compression denial of service (CVE-2022-32206)

* curl: HTTP multi-header compression denial of service (CVE-2023-23916)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2099300 - CVE-2022-32206 curl: HTTP compression denial of service
2167815 - CVE-2023-23916 curl: HTTP multi-header compression denial of service

6. Package List:

Red Hat Enterprise Linux BaseOS AUS (v.8.4):

Source:
curl-7.61.1-18.el8_4.3.src.rpm

aarch64:
curl-7.61.1-18.el8_4.3.aarch64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
curl-debugsource-7.61.1-18.el8_4.3.aarch64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-devel-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm

ppc64le:
curl-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debugsource-7.61.1-18.el8_4.3.ppc64le.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-devel-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm

s390x:
curl-7.61.1-18.el8_4.3.s390x.rpm
curl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
curl-debugsource-7.61.1-18.el8_4.3.s390x.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-7.61.1-18.el8_4.3.s390x.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-devel-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm

x86_64:
curl-7.61.1-18.el8_4.3.x86_64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
curl-debugsource-7.61.1-18.el8_4.3.i686.rpm
curl-debugsource-7.61.1-18.el8_4.3.x86_64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-7.61.1-18.el8_4.3.i686.rpm
libcurl-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-devel-7.61.1-18.el8_4.3.i686.rpm
libcurl-devel-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm

Red Hat Enterprise Linux BaseOS E4S (v.8.4):

Source:
curl-7.61.1-18.el8_4.3.src.rpm

aarch64:
curl-7.61.1-18.el8_4.3.aarch64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
curl-debugsource-7.61.1-18.el8_4.3.aarch64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-devel-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm

ppc64le:
curl-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debugsource-7.61.1-18.el8_4.3.ppc64le.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-devel-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm

s390x:
curl-7.61.1-18.el8_4.3.s390x.rpm
curl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
curl-debugsource-7.61.1-18.el8_4.3.s390x.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-7.61.1-18.el8_4.3.s390x.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-devel-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm

x86_64:
curl-7.61.1-18.el8_4.3.x86_64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
curl-debugsource-7.61.1-18.el8_4.3.i686.rpm
curl-debugsource-7.61.1-18.el8_4.3.x86_64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-7.61.1-18.el8_4.3.i686.rpm
libcurl-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-devel-7.61.1-18.el8_4.3.i686.rpm
libcurl-devel-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm

Red Hat Enterprise Linux BaseOS TUS (v.8.4):

Source:
curl-7.61.1-18.el8_4.3.src.rpm

aarch64:
curl-7.61.1-18.el8_4.3.aarch64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
curl-debugsource-7.61.1-18.el8_4.3.aarch64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-devel-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm

ppc64le:
curl-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debugsource-7.61.1-18.el8_4.3.ppc64le.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-devel-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm

s390x:
curl-7.61.1-18.el8_4.3.s390x.rpm
curl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
curl-debugsource-7.61.1-18.el8_4.3.s390x.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-7.61.1-18.el8_4.3.s390x.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-devel-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm

x86_64:
curl-7.61.1-18.el8_4.3.x86_64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
curl-debugsource-7.61.1-18.el8_4.3.i686.rpm
curl-debugsource-7.61.1-18.el8_4.3.x86_64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-7.61.1-18.el8_4.3.i686.rpm
libcurl-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-devel-7.61.1-18.el8_4.3.i686.rpm
libcurl-devel-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-32206
https://access.redhat.com/security/cve/CVE-2023-23916
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=KCBX
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close