Bug 1710609 (CVE-2019-5435)

Summary: CVE-2019-5435 curl: Integer overflows in curl_url_set() function
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: andrew.slice, bodavis, csutherl, dbhole, gzaronik, hhorak, jclere, john.j5live, jorton, kanderso, kdudka, lgao, luhliari, mbabacek, msekleta, mturk, myarboro, omajid, paul, rwagner, security-response-team, twalsh, weli
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: curl 7.65.0 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-05-20 05:51:01 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1712839    
Bug Blocks: 1710621    

Description Pedro Sampaio 2019-05-15 20:58:23 UTC
libcurl contains two integer overflows in the `curl_url_set()` function that
if triggered, can lead to a too small buffer allocation and a subsequent heap
buffer overflow.

Upstream patch:

https://github.com/curl/curl/commit/5fc28510a4664f4

References:

https://curl.haxx.se/docs/CVE-2019-5435.html

Comment 2 Huzaifa S. Sidhpurwala 2019-05-20 05:45:25 UTC
This flaw only manifests itself on 32bit arches. 

There are two entry points to this issue, on 32 bit architectures.

By asking libcurl to parse a string, passing in a string longer than 2GB to this API: `curl_url_set(uh, CURLUPART_URL, "string", 0);` triggers the bug.

Asking libcurl to update a URL with a new string, and URL encoded it in the process, by passing in a string longer than 1.33GB to this API:
`curl_url_set(uh, CURLUPART_*, "string", CURLU_URLENCODE);` triggers the bug.

This bug was introduced in August 2018 in
[commit fb30ac5a2d](https://github.com/curl/curl/commit/fb30ac5a2d63773c52).

Comment 3 Huzaifa S. Sidhpurwala 2019-05-20 08:42:35 UTC
Acknowledgments:

Name: the Curl project
Upstream: Wenchao Li

Comment 4 Dhananjay Arunesh 2019-05-22 11:01:16 UTC
Created curl tracking bugs for this issue:

Affects: fedora-all [bug 1712839]

Comment 7 errata-xmlrpc 2020-10-28 15:49:38 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2020:4383 https://access.redhat.com/errata/RHSA-2020:4383

Comment 8 errata-xmlrpc 2020-10-28 16:00:45 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 7
  JBoss Core Services on RHEL 6

Via RHSA-2020:4384 https://access.redhat.com/errata/RHSA-2020:4384