Back to bug 2135412
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Marian Rehak | 2022-10-17 15:11:16 UTC | CC | security-response-team | |
| Marian Rehak | 2022-10-17 15:15:04 UTC | Fixed In Version | curl 7.84.0 | curl 7.86.0 |
| Sandipan Roy | 2022-10-26 07:13:10 UTC | CC | dffrench, gzaronik, ngough, rgodfrey | |
| Summary | EMBARGOED CVE-2022-35260 curl: .netrc parser out-of-bounds access | CVE-2022-35260 curl: .netrc parser out-of-bounds access | ||
| Doc Text | A vulnerability found in curl. This security flaw happens because curl can be told to parse a `.netrc` file for credentials and if that file ends in a line with consecutive non-white space letters and no newline, curl could read past the end of the stack-based buffer, and if the read works, write a zero byte possibly beyond its boundary. This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes. If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service. | |||
| Deadline | 2022-10-26 | |||
| Group | security, qe_staff | |||
| RaTasha Tillery-Smith | 2022-10-26 12:35:21 UTC | Doc Text | A vulnerability found in curl. This security flaw happens because curl can be told to parse a `.netrc` file for credentials and if that file ends in a line with consecutive non-white space letters and no newline, curl could read past the end of the stack-based buffer, and if the read works, write a zero byte possibly beyond its boundary. This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes. If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service. | A vulnerability was found in curl. The issue occurs when curl is told to parse a `.netrc` file for credentials. If that file ends in a line with consecutive non-white space letters and no newline, curl could read past the end of the stack-based buffer, and if the read works, it can write a zero byte beyond its boundary. This issue, in most cases, causes a segfault or similar problem. A denial of service can occur if a malicious user can provide a custom netrc file to an application or otherwise affect its contents. |
| Red Hat Bugzilla | 2022-10-28 13:12:44 UTC | CC | krathod | |
| Red Hat Bugzilla | 2023-07-07 08:30:21 UTC | Assignee | security-response-team | nobody |
| CC | security-response-team |
Back to bug 2135412