curl supports "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was capped, but the cap was implemented on a per-header basis allowing a malicious server to insert a virtually unlimited number of compression steps simply by using many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.
This CVE is public now. https://curl.se/docs/CVE-2023-23916.html
Created curl tracking bugs for this issue: Affects: fedora-all [bug 2170751] Created mingw-curl tracking bugs for this issue: Affects: fedora-all [bug 2170752]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:1140 https://access.redhat.com/errata/RHSA-2023:1140
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:1701 https://access.redhat.com/errata/RHSA-2023:1701
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:1842 https://access.redhat.com/errata/RHSA-2023:1842
This issue has been addressed in the following products: JBCS httpd 2.4.51.sp2 Via RHSA-2023:3355 https://access.redhat.com/errata/RHSA-2023:3355
This issue has been addressed in the following products: JBoss Core Services on RHEL 7 JBoss Core Services for RHEL 8 Via RHSA-2023:3354 https://access.redhat.com/errata/RHSA-2023:3354
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2023:3460 https://access.redhat.com/errata/RHSA-2023:3460
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-23916
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:4139 https://access.redhat.com/errata/RHSA-2023:4139