All Vulnerability Reports

USN-6237-3: curl vulnerabilities


Severity

Low

Vendor

VMware Tanzu

Versions Affected

  • Canonical Ubuntu 16.04
  • Canonical Ubuntu 18.04
  • Canonical Ubuntu 22.04

Description

USN-6237-1 fixed several vulnerabilities in curl. This update provides the corresponding updates for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS. Original advisory details: Hiroki Kurosawa discovered that curl incorrectly handled validating certain certificate wildcards. A remote attacker could possibly use this issue to spoof certain website certificates using IDN hosts. (CVE-2023-28321) Hiroki Kurosawa discovered that curl incorrectly handled callbacks when certain options are set by applications. This could cause applications using curl to misbehave, resulting in information disclosure, or a denial of service. (CVE-2023-28322) It was discovered that curl incorrectly handled saving cookies to files. A local attacker could possibly use this issue to create or overwrite files. This issue only affected Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-32001) Update Instructions: Run `sudo pro fix USN-6237-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcurl4-gnutls-dev - 7.47.0-1ubuntu2.19+esm9 libcurl4-openssl-dev - 7.47.0-1ubuntu2.19+esm9 libcurl3-gnutls - 7.47.0-1ubuntu2.19+esm9 libcurl4-doc - 7.47.0-1ubuntu2.19+esm9 libcurl3-nss - 7.47.0-1ubuntu2.19+esm9 libcurl4-nss-dev - 7.47.0-1ubuntu2.19+esm9 libcurl3 - 7.47.0-1ubuntu2.19+esm9 curl - 7.47.0-1ubuntu2.19+esm9 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro

CVEs contained in this USN include: CVE-2023-28321, CVE-2023-28322

Affected VMware Products and Versions

Severity is low unless otherwise noted.

  • Platform Automation Toolkit
    • 4.4.x versions prior to 4.4.32
    • 5.0.x versions prior to 5.0.25
    • 5.1.x versions prior to 5.1.2
  • Isolation Segment
    • 2.11.x versions prior to 2.11.40, or later versions with Xenial Stemcells prior to 621.687
    • 2.13.x versions prior to 2.13.25, or later versions with Xenial Stemcells prior to 621.687
    • 3.0.x versions prior to 3.0.18
    • 4.0.x versions prior to 4.0.10+LTS-T
  • Operations Manager
    • 2.10.x versions prior to 2.10.61
  • VMware Tanzu Application Service for VMs
    • 2.11.x versions prior to 2.11.46, or later versions with Xenial Stemcells prior to 621.687
    • 2.13.x versions prior to 2.13.28, or later versions with Xenial Stemcells prior to 621.687
    • 3.0.x versions prior to 3.0.18
    • 4.0.x versions prior to 4.0.10+LTS-T

Mitigation

Users of affected products are strongly encouraged to follow the mitigation below. On the Tanzu Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:

  • Platform Automation Toolkit
    • 4.4.32
    • 5.0.25
    • 5.1.2
  • Isolation Segment
    • 2.11.40, and upgrade Xenial Stemcells to 621.687 or greater
    • 2.13.25, and upgrade Xenial Stemcells to 621.687 or greater
    • 3.0.18
    • 4.0.10+LTS-T
  • Operations Manager
    • 2.10.61
  • VMware Tanzu Application Service for VMs
    • 2.11.46, and upgrade Xenial Stemcells to 621.687 or greater
    • 2.13.28, and upgrade Xenial Stemcells to 621.687 or greater
    • 3.0.18
    • 4.0.10+LTS-T

References