Bug 2179103 (CVE-2023-27538) - CVE-2023-27538 curl: SSH connection too eager reuse still
Summary: CVE-2023-27538 curl: SSH connection too eager reuse still
Keywords:
Status: NEW
Alias: CVE-2023-27538
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2179110 2179111 2179112 2180435 2180437
Blocks: 2178228
TreeView+ depends on / blocked
 
Reported: 2023-03-16 16:11 UTC by Marian Rehak
Modified: 2024-02-05 16:57 UTC (History)
14 users (show)

Fixed In Version: curl 8.0.0
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:6679 0 None None None 2023-11-07 08:22:37 UTC

Description Marian Rehak 2023-03-16 16:11:41 UTC
libcurl would reuse a previously created connection even when an SSH related option had been changed that should have prohibited reuse. libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, two SSH settings were left out from the configuration match checks, making them match too easily.

Comment 2 Sandipan Roy 2023-03-21 13:05:09 UTC
Created curl tracking bugs for this issue:

Affects: fedora-all [bug 2180435]


Created mingw-curl tracking bugs for this issue:

Affects: fedora-all [bug 2180437]

Comment 5 errata-xmlrpc 2023-11-07 08:22:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6679 https://access.redhat.com/errata/RHSA-2023:6679


Note You need to log in before you can comment on or make changes to this bug.