Bug 2196786 (CVE-2023-28321) - CVE-2023-28321 curl: IDN wildcard match may lead to Improper Cerificate Validation
Summary: CVE-2023-28321 curl: IDN wildcard match may lead to Improper Cerificate Valid...
Keywords:
Status: NEW
Alias: CVE-2023-28321
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2203230 2203878 2203879 2203880 2203881 2207899 2207900 2233496 2233497
Blocks: 2196613
TreeView+ depends on / blocked
 
Reported: 2023-05-10 08:59 UTC by Marian Rehak
Modified: 2024-02-05 16:57 UTC (History)
17 users (show)

Fixed In Version: curl 8.1.0
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Curl package. An incorrect International Domain Name (IDN) wildcard match may lead to improper certificate validation.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:4354 0 None None None 2023-08-01 08:49:35 UTC
Red Hat Product Errata RHSA-2023:4523 0 None None None 2023-08-08 08:19:58 UTC
Red Hat Product Errata RHSA-2023:4628 0 None None None 2023-08-15 17:37:20 UTC
Red Hat Product Errata RHSA-2023:4629 0 None None None 2023-08-15 17:40:54 UTC
Red Hat Product Errata RHSA-2023:5598 0 None None None 2023-10-10 15:24:34 UTC
Red Hat Product Errata RHSA-2023:6292 0 None None None 2023-11-02 16:02:50 UTC

Description Marian Rehak 2023-05-10 08:59:40 UTC
curl supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own
name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

Comment 3 Marian Rehak 2023-05-17 08:57:39 UTC
Created curl tracking bugs for this issue:

Affects: fedora-all [bug 2207899]


Created mingw-curl tracking bugs for this issue:

Affects: fedora-all [bug 2207900]

Comment 6 errata-xmlrpc 2023-08-01 08:49:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:4354 https://access.redhat.com/errata/RHSA-2023:4354

Comment 7 errata-xmlrpc 2023-08-08 08:19:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:4523 https://access.redhat.com/errata/RHSA-2023:4523

Comment 8 errata-xmlrpc 2023-08-15 17:37:18 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2023:4628 https://access.redhat.com/errata/RHSA-2023:4628

Comment 9 errata-xmlrpc 2023-08-15 17:40:52 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 7
  JBoss Core Services for RHEL 8

Via RHSA-2023:4629 https://access.redhat.com/errata/RHSA-2023:4629

Comment 11 errata-xmlrpc 2023-10-10 15:24:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:5598 https://access.redhat.com/errata/RHSA-2023:5598

Comment 12 errata-xmlrpc 2023-11-02 16:02:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:6292 https://access.redhat.com/errata/RHSA-2023:6292


Note You need to log in before you can comment on or make changes to this bug.