Red Hat Security Advisory 2023-3460-01 - The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Issues addressed include a denial of service vulnerability.
4f35d214f26f023db9755bcd3961524c8e3816178818ad49bdfc847516db4cee
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: curl security update
Advisory ID: RHSA-2023:3460-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3460
Issue date: 2023-06-06
CVE Names: CVE-2022-32206 CVE-2023-23916
=====================================================================
1. Summary:
An update for curl is now available for Red Hat Enterprise Linux 8.4
Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4
Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update
Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux BaseOS AUS (v.8.4) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS E4S (v.8.4) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS TUS (v.8.4) - aarch64, ppc64le, s390x, x86_64
3. Description:
The curl packages provide the libcurl library and the curl utility for
downloading files from servers using various protocols, including HTTP,
FTP, and LDAP.
Security Fix(es):
* curl: HTTP compression denial of service (CVE-2022-32206)
* curl: HTTP multi-header compression denial of service (CVE-2023-23916)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
2099300 - CVE-2022-32206 curl: HTTP compression denial of service
2167815 - CVE-2023-23916 curl: HTTP multi-header compression denial of service
6. Package List:
Red Hat Enterprise Linux BaseOS AUS (v.8.4):
Source:
curl-7.61.1-18.el8_4.3.src.rpm
aarch64:
curl-7.61.1-18.el8_4.3.aarch64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
curl-debugsource-7.61.1-18.el8_4.3.aarch64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-devel-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
ppc64le:
curl-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debugsource-7.61.1-18.el8_4.3.ppc64le.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-devel-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
s390x:
curl-7.61.1-18.el8_4.3.s390x.rpm
curl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
curl-debugsource-7.61.1-18.el8_4.3.s390x.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-7.61.1-18.el8_4.3.s390x.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-devel-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
x86_64:
curl-7.61.1-18.el8_4.3.x86_64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
curl-debugsource-7.61.1-18.el8_4.3.i686.rpm
curl-debugsource-7.61.1-18.el8_4.3.x86_64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-7.61.1-18.el8_4.3.i686.rpm
libcurl-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-devel-7.61.1-18.el8_4.3.i686.rpm
libcurl-devel-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
Red Hat Enterprise Linux BaseOS E4S (v.8.4):
Source:
curl-7.61.1-18.el8_4.3.src.rpm
aarch64:
curl-7.61.1-18.el8_4.3.aarch64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
curl-debugsource-7.61.1-18.el8_4.3.aarch64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-devel-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
ppc64le:
curl-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debugsource-7.61.1-18.el8_4.3.ppc64le.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-devel-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
s390x:
curl-7.61.1-18.el8_4.3.s390x.rpm
curl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
curl-debugsource-7.61.1-18.el8_4.3.s390x.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-7.61.1-18.el8_4.3.s390x.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-devel-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
x86_64:
curl-7.61.1-18.el8_4.3.x86_64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
curl-debugsource-7.61.1-18.el8_4.3.i686.rpm
curl-debugsource-7.61.1-18.el8_4.3.x86_64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-7.61.1-18.el8_4.3.i686.rpm
libcurl-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-devel-7.61.1-18.el8_4.3.i686.rpm
libcurl-devel-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
Red Hat Enterprise Linux BaseOS TUS (v.8.4):
Source:
curl-7.61.1-18.el8_4.3.src.rpm
aarch64:
curl-7.61.1-18.el8_4.3.aarch64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
curl-debugsource-7.61.1-18.el8_4.3.aarch64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-devel-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.aarch64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.aarch64.rpm
ppc64le:
curl-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
curl-debugsource-7.61.1-18.el8_4.3.ppc64le.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-devel-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-7.61.1-18.el8_4.3.ppc64le.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.ppc64le.rpm
s390x:
curl-7.61.1-18.el8_4.3.s390x.rpm
curl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
curl-debugsource-7.61.1-18.el8_4.3.s390x.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-7.61.1-18.el8_4.3.s390x.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
libcurl-devel-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-7.61.1-18.el8_4.3.s390x.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.s390x.rpm
x86_64:
curl-7.61.1-18.el8_4.3.x86_64.rpm
curl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
curl-debugsource-7.61.1-18.el8_4.3.i686.rpm
curl-debugsource-7.61.1-18.el8_4.3.x86_64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-7.61.1-18.el8_4.3.i686.rpm
libcurl-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-devel-7.61.1-18.el8_4.3.i686.rpm
libcurl-devel-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-7.61.1-18.el8_4.3.x86_64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.i686.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2022-32206
https://access.redhat.com/security/cve/CVE-2023-23916
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=KCBX
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce