Bug 2196786 (CVE-2023-28321)

Summary: CVE-2023-28321 curl: IDN wildcard match may lead to Improper Cerificate Validation
Product: [Other] Security Response Reporter: Marian Rehak <mrehak>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: andrew.slice, bodavis, csutherl, dbhole, ggasparb, jclere, jmigacz, kdudka, kyoshida, mturk, omajid, peholase, pjindal, plodge, szappis
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: curl 8.1.0 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Curl package. An incorrect International Domain Name (IDN) wildcard match may lead to improper certificate validation.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2203230, 2203878, 2203879, 2203880, 2203881, 2207899, 2207900, 2233496, 2233497    
Bug Blocks: 2196613    

Description Marian Rehak 2023-05-10 08:59:40 UTC
curl supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own
name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

Comment 3 Marian Rehak 2023-05-17 08:57:39 UTC
Created curl tracking bugs for this issue:

Affects: fedora-all [bug 2207899]


Created mingw-curl tracking bugs for this issue:

Affects: fedora-all [bug 2207900]

Comment 6 errata-xmlrpc 2023-08-01 08:49:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:4354 https://access.redhat.com/errata/RHSA-2023:4354

Comment 7 errata-xmlrpc 2023-08-08 08:19:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:4523 https://access.redhat.com/errata/RHSA-2023:4523

Comment 8 errata-xmlrpc 2023-08-15 17:37:18 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2023:4628 https://access.redhat.com/errata/RHSA-2023:4628

Comment 9 errata-xmlrpc 2023-08-15 17:40:52 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 7
  JBoss Core Services for RHEL 8

Via RHSA-2023:4629 https://access.redhat.com/errata/RHSA-2023:4629

Comment 11 errata-xmlrpc 2023-10-10 15:24:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:5598 https://access.redhat.com/errata/RHSA-2023:5598

Comment 12 errata-xmlrpc 2023-11-02 16:02:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:6292 https://access.redhat.com/errata/RHSA-2023:6292