git: a3dec5316c3e - main - security/vuxml: Document cURL vulnerability

From: Bernard Spil <brnrd_at_FreeBSD.org>
Date: Sat, 16 Sep 2023 13:28:49 UTC
The branch main has been updated by brnrd:

URL: https://cgit.FreeBSD.org/ports/commit/?id=a3dec5316c3e45a676eef22de283ad57ea6a3111

commit a3dec5316c3e45a676eef22de283ad57ea6a3111
Author:     Bernard Spil <brnrd@FreeBSD.org>
AuthorDate: 2023-09-16 13:27:51 +0000
Commit:     Bernard Spil <brnrd@FreeBSD.org>
CommitDate: 2023-09-16 13:27:51 +0000

    security/vuxml: Document cURL vulnerability
    
    PR:             273764
    Reported by:    yasu
---
 security/vuxml/attachment.cgi?id=244811 | 57 +++++++++++++++++++++++++++++++++
 security/vuxml/vuln/2023.xml            | 36 +++++++++++++++++++++
 2 files changed, 93 insertions(+)

diff --git a/security/vuxml/attachment.cgi?id=244811 b/security/vuxml/attachment.cgi?id=244811
new file mode 100644
index 000000000000..20c93ef1ae8f
--- /dev/null
+++ b/security/vuxml/attachment.cgi?id=244811
@@ -0,0 +1,57 @@
+From 7ea414f0f67c4e6e54d86d54fd639ff476d9af73 Mon Sep 17 00:00:00 2001
+From: Yasuhiro Kimura <yasu@FreeBSD.org>
+Date: Thu, 14 Sep 2023 00:15:37 +0900
+Subject: [PATCH] security/vuxml: Document "eat all memory" vulnerability in
+ curl
+
+---
+ security/vuxml/vuln/2023.xml | 36 ++++++++++++++++++++++++++++++++++++
+ 1 file changed, 36 insertions(+)
+
+diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
+index eb3c8fd68d81..862e66ee01b6 100644
+--- a/security/vuxml/vuln/2023.xml
++++ b/security/vuxml/vuln/2023.xml
+@@ -1,3 +1,39 @@
++  <vuln vid="833b469b-5247-11ee-9667-080027f5fec9">
++    <topic>curl -- HTTP headers eat all memory</topic>
++    <affects>
++      <package>
++	<name>curl</name>
++	<range><lt>8.3.0</lt></range>
++      </package>
++    </affects>
++    <description>
++      <body xmlns="http://www.w3.org/1999/xhtml">
++	<p>selmelc on hackerone reports:</p>
++	<blockquote cite="https://curl.se/docs/CVE-2023-38039.html">
++	  <p>
++	    When curl retrieves an HTTP response, it stores the
++	    incoming headers so that they can be accessed later via
++	    the libcurl headers API.
++	  </p>
++	  <p>
++	    However, curl did not have a limit in how many or how
++	    large headers it would accept in a response, allowing a
++	    malicious server to stream an endless series of headers
++	    and eventually cause curl to run out of heap memory.
++	  </p>
++	</blockquote>
++      </body>
++    </description>
++    <references>
++      <cvename>CVE-2023-38039</cvename>
++      <url>https://curl.se/docs/CVE-2023-38039.html HERE</url>
++    </references>
++    <dates>
++      <discovery>2023-09-13</discovery>
++      <entry>2023-09-13</entry>
++    </dates>
++  </vuln>
++
+   <vuln vid="b5508c08-547a-11ee-85eb-84a93843eb75">
+     <topic>Roundcube -- XSS vulnerability</topic>
+     <affects>
+-- 
+2.42.0
+
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index c3b1509b15e5..25773c90c5a5 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,39 @@
+  <vuln vid="833b469b-5247-11ee-9667-080027f5fec9">
+    <topic>curl -- HTTP headers eat all memory</topic>
+    <affects>
+      <package>
+	<name>curl</name>
+	<range><lt>8.3.0</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>selmelc on hackerone reports:</p>
+	<blockquote cite="https://curl.se/docs/CVE-2023-38039.html">
+	  <p>
+	    When curl retrieves an HTTP response, it stores the
+	    incoming headers so that they can be accessed later via
+	    the libcurl headers API.
+	  </p>
+	  <p>
+	    However, curl did not have a limit in how many or how
+	    large headers it would accept in a response, allowing a
+	    malicious server to stream an endless series of headers
+	    and eventually cause curl to run out of heap memory.
+	  </p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2023-38039</cvename>
+      <url>https://curl.se/docs/CVE-2023-38039.html HERE</url>
+    </references>
+    <dates>
+      <discovery>2023-09-13</discovery>
+      <entry>2023-09-13</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="b5508c08-547a-11ee-85eb-84a93843eb75">
     <topic>Roundcube -- XSS vulnerability</topic>
     <affects>