Bug 1362199 (CVE-2016-5421)
Summary: | CVE-2016-5421 curl: Use of connection struct after free | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | alonbl, bmcclain, bodavis, cfergeau, csutherl, dbhole, dblechte, dkholia, eedri, hhorak, jclere, jorton, kanderso, kdudka, kseifried, lgao, lsurette, luhliari, lzachar, mbabacek, mgoldboi, michal.skrivanek, myarboro, omajid, rbalakri, rwagner, sardella, security-response-team, sherold, slawomir, srevivo, twalsh, weli, ykaul, ylavi |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | curl 7.50.1 | Doc Type: | If docs needed, set a value |
Doc Text: |
A use-after-free flaw was found in libcurl. When invoking curl_easy_perform() after cleaning up a multi session, an application can be tricked into using libcurl to connect to a malicious server, allowing an attacker to potentially execute arbitrary code. The highest threat from this vulnerability is to data confidentiality and integrity as well as data confidentiality.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2016-11-04 08:13:26 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1363642, 1363643, 1363644 | ||
Bug Blocks: | 1362200 |
Description
Adam Mariš
2016-08-01 13:51:21 UTC
Created curl tracking bugs for this issue: Affects: fedora-all [bug 1363642] Created mingw-curl tracking bugs for this issue: Affects: fedora-all [bug 1363643] Affects: epel-7 [bug 1363644] curl-7.47.1-6.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report. curl-7.43.0-8.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2018:3558 Statement: The versions of `curl` as shipped with Red Hat Enterprise Linux 5, 6, and 7 are marked as "notaffected" because they did not include the vulnerable code, which was introduced in a later version of the package. Specifically, the struct field affected by this flaw was introduced in `curl` upstream version 7.32.0. The version of `curl` as shipped with Red Hat Enterprise Linux 7 is 7.29.0. This flaw was introduced in upstream version 7.32.0 via the following commit: https://github.com/curl/curl/commit/09b9fc9009bfe6b7b6fd5ba82e81b4ca76539d8d More in detail, the affected field `easy_conn` was added in the SessionHandle struct in lib/urldata.h. Only libcurl >= 7.32.0 to and including 7.50.0 are affected by this flaw. |