Bug 2309415 - CVE-2024-7264 curl: ASN.1 date parser overread [fedora-all]
Summary: CVE-2024-7264 curl: ASN.1 date parser overread [fedora-all]
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: curl
Version: 40
Hardware: Unspecified
OS: Unspecified
low
low
Target Milestone: ---
Assignee: Jan Macku
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: {"flaws": ["8ee117ea-26fb-4e08-87c6-5...
Depends On:
Blocks: CVE-2024-7264
TreeView+ depends on / blocked
 
Reported: 2024-09-03 12:15 UTC by TEJ RATHI
Modified: 2024-09-12 08:45 UTC (History)
7 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2024-09-12 08:45:09 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description TEJ RATHI 2024-09-03 12:15:41 UTC
More information about this security flaw is available in the following bug:

https://bugzilla.redhat.com/show_bug.cgi?id=2301888

Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Jan Macku 2024-09-12 08:45:09 UTC
IMHO, Fedora is not affected by this CVE because we build curl with OpenSSL. According to upstream, only versions built with GnuTLS, Schannel, Secure Transport, or mbedTLS are affected.

See - https://curl.se/docs/CVE-2024-7264.html

> The vulnerable code can only be reached when curl is built to use GnuTLS, Schannel, Secure Transport, or mbedTLS. Builds using other TLS backends are not vulnerable.


Note You need to log in before you can comment on or make changes to this bug.