Samuel Henrique pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
5a538ccd by Samuel Henrique at 2022-12-27T22:39:15+00:00
curl: Mark CVE-2021-22923 and CVE-2021-22922 as not-affected
Since we don't build curl with metalink support.
Also improves explanation for CVE-2022-42916 and CVE-2022-43551 as
curl is not built with HSTS support (for buster and bullseye).
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -16782,8 +16782,8 @@ CVE-2022-43552 [HTTP Proxy deny use-after-free]
NOTE: Fixed by:
https://github.com/curl/curl/commit/4f20188ac644afe174be6005ef4f6ffba232b8b2
(curl-7_87_0)
CVE-2022-43551 (A vulnerability exists in curl <7.87.0 HSTS check that
could be byp ...)
- curl 7.86.0-3 (bug #1026829)
- [bullseye] - curl <not-affected> (Vulnerable code not present)
- [buster] - curl <not-affected> (Vulnerable code not present)
+ [bullseye] - curl <not-affected> (curl is not built with HSTS support)
+ [buster] - curl <not-affected> (curl is not built with HSTS support)
NOTE: https://curl.se/docs/CVE-2022-43551.html
NOTE: Introduced by:
https://github.com/curl/curl/commit/7385610d0c74c6a254fea5e4cd6e1d559d848c8c
(curl-7_74_0)
NOTE: Enabled by default since:
https://github.com/curl/curl/commit/d71ff2b9db566b3f4b2eb29441c2df86715d4339
(curl-7_77_0)
@@ -18666,8 +18666,8 @@ CVE-2022-42917
RESERVED
CVE-2022-42916 (In curl before 7.86.0, the HSTS check could be bypassed to
trick it in ...)
- curl 7.86.0-1
- [bullseye] - curl <not-affected> (Vulnerable code not present)
- [buster] - curl <not-affected> (Vulnerable code not present)
+ [bullseye] - curl <not-affected> (curl is not built with HSTS support)
+ [buster] - curl <not-affected> (curl is not built with HSTS support)
NOTE: https://curl.se/docs/CVE-2022-42916.html
NOTE: Introduced with:
https://github.com/curl/curl/commit/7385610d0c74c6a254fea5e4cd6e1d559d848c8c
(curl-7_74_0)
NOTE: Enabled by default since:
https://github.com/curl/curl/commit/d71ff2b9db566b3f4b2eb29441c2df86715d4339
(curl-7_77_0)
@@ -142714,6 +142714,8 @@ CVE-2021-22924 (libcurl keeps previously used
connections in a connection pool f
NOTE: https://www.openwall.com/lists/oss-security/2021/07/21/3
CVE-2021-22923 (When curl is instructed to get content using the metalink
feature, and ...)
- curl 7.79.1-1 (unimportant)
+ [buster] - curl <not-affected> (curl is not built with metalink support)
+ [bullseye] - curl <not-affected> (curl is not built with metalink
support)
NOTE: https://curl.se/docs/CVE-2021-22923.html
NOTE: https://www.openwall.com/lists/oss-security/2021/07/21/2
NOTE: The fix for earlier versions is to rebuild curl with the metalink
support
@@ -142721,6 +142723,8 @@ CVE-2021-22923 (When curl is instructed to get
content using the metalink featur
NOTE: Metalink support not enabled in Debian builds.
CVE-2021-22922 (When curl is instructed to download content using the metalink
feature ...)
- curl 7.79.1-1 (unimportant)
+ [buster] - curl <not-affected> (curl is not built with metalink support)
+ [bullseye] - curl <not-affected> (curl is not built with metalink
support)
NOTE: https://curl.se/docs/CVE-2021-22922.html
NOTE: https://www.openwall.com/lists/oss-security/2021/07/21/1
NOTE: The fix for earlier versions is to rebuild curl with the metalink
support
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5a538ccd0f3cbab82bc0bd674a6d50ce78962b2e
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5a538ccd0f3cbab82bc0bd674a6d50ce78962b2e
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits