MGASA-2024-0360

Source
https://advisories.mageia.org/MGASA-2024-0360.html
Import Source
https://advisories.mageia.org/MGASA-2024-0360.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0360
Related
Published
2024-11-12T19:53:59Z
Modified
2024-11-11T19:39:42Z
Summary
Updated curl packages fix security vulnerability
Details

When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than otherwise intended. This affects curl using applications that enable HSTS and use URLs with the insecure HTTP:// scheme and perform transfers with hosts like x.example.com as well as example.com where the first host is a subdomain of the second host. This flaw also affects the curl command line tool. When triggered, this is a potential minor DoS security problem when trying to use HTTPS when that no longer works or a cleartext transmission of data that was otherwise intended to possibly be protected. This update fixes the issue so subdomains cannot affect the HSTS cache of a parent domain.

References
Credits

Affected packages

Mageia:9 / curl

Package

Name
curl
Purl
pkg:rpm/mageia/curl?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.88.1-4.4.mga9

Ecosystem specific

{
    "section": "core"
}