MGASA-2023-0263

Source
https://advisories.mageia.org/MGASA-2023-0263.html
Import Source
https://advisories.mageia.org/MGASA-2023-0263.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2023-0263
Related
Published
2023-09-24T22:16:18Z
Modified
2023-09-24T20:20:03Z
Summary
Updated curl packages fix security vulnerability
Details

TELNET option IAC injection. (CVE-2023-27533)

SFTP path ~ resolving discrepancy. (CVE-2023-27534)

FTP too eager connection reuse. (CVE-2023-27535)

GSS delegation too eager connection re-use. (CVE-2023-27536)

HSTS double free. (CVE-2023-27537)

SSH connection too eager reuse still. (CVE-2023-27538)

UAF in SSH sha256 fingerprint check. (CVE-2023-28319)

siglongjmp race condition. (CVE-2023-28320)

IDN wildcard match. (CVE-2023-28321)

more POST-after-PUT confusion. (CVE-2023-28322)

HTTP headers eat all memory. (CVE-2023-38039)

References
Credits

Affected packages

Mageia:9 / curl

Package

Name
curl
Purl
pkg:rpm/mageia/curl?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.88.1-3.1.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / curl

Package

Name
curl
Purl
pkg:rpm/mageia/curl?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.74.0-1.13.mga8

Ecosystem specific

{
    "section": "core"
}