git: a3dec5316c3e - main - security/vuxml: Document cURL vulnerability
Date: Sat, 16 Sep 2023 13:28:49 UTC
The branch main has been updated by brnrd: URL: https://cgit.FreeBSD.org/ports/commit/?id=a3dec5316c3e45a676eef22de283ad57ea6a3111 commit a3dec5316c3e45a676eef22de283ad57ea6a3111 Author: Bernard Spil <brnrd@FreeBSD.org> AuthorDate: 2023-09-16 13:27:51 +0000 Commit: Bernard Spil <brnrd@FreeBSD.org> CommitDate: 2023-09-16 13:27:51 +0000 security/vuxml: Document cURL vulnerability PR: 273764 Reported by: yasu --- security/vuxml/attachment.cgi?id=244811 | 57 +++++++++++++++++++++++++++++++++ security/vuxml/vuln/2023.xml | 36 +++++++++++++++++++++ 2 files changed, 93 insertions(+) diff --git a/security/vuxml/attachment.cgi?id=244811 b/security/vuxml/attachment.cgi?id=244811 new file mode 100644 index 000000000000..20c93ef1ae8f --- /dev/null +++ b/security/vuxml/attachment.cgi?id=244811 @@ -0,0 +1,57 @@ +From 7ea414f0f67c4e6e54d86d54fd639ff476d9af73 Mon Sep 17 00:00:00 2001 +From: Yasuhiro Kimura <yasu@FreeBSD.org> +Date: Thu, 14 Sep 2023 00:15:37 +0900 +Subject: [PATCH] security/vuxml: Document "eat all memory" vulnerability in + curl + +--- + security/vuxml/vuln/2023.xml | 36 ++++++++++++++++++++++++++++++++++++ + 1 file changed, 36 insertions(+) + +diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml +index eb3c8fd68d81..862e66ee01b6 100644 +--- a/security/vuxml/vuln/2023.xml ++++ b/security/vuxml/vuln/2023.xml +@@ -1,3 +1,39 @@ ++ <vuln vid="833b469b-5247-11ee-9667-080027f5fec9"> ++ <topic>curl -- HTTP headers eat all memory</topic> ++ <affects> ++ <package> ++ <name>curl</name> ++ <range><lt>8.3.0</lt></range> ++ </package> ++ </affects> ++ <description> ++ <body xmlns="http://www.w3.org/1999/xhtml"> ++ <p>selmelc on hackerone reports:</p> ++ <blockquote cite="https://curl.se/docs/CVE-2023-38039.html"> ++ <p> ++ When curl retrieves an HTTP response, it stores the ++ incoming headers so that they can be accessed later via ++ the libcurl headers API. ++ </p> ++ <p> ++ However, curl did not have a limit in how many or how ++ large headers it would accept in a response, allowing a ++ malicious server to stream an endless series of headers ++ and eventually cause curl to run out of heap memory. ++ </p> ++ </blockquote> ++ </body> ++ </description> ++ <references> ++ <cvename>CVE-2023-38039</cvename> ++ <url>https://curl.se/docs/CVE-2023-38039.html HERE</url> ++ </references> ++ <dates> ++ <discovery>2023-09-13</discovery> ++ <entry>2023-09-13</entry> ++ </dates> ++ </vuln> ++ + <vuln vid="b5508c08-547a-11ee-85eb-84a93843eb75"> + <topic>Roundcube -- XSS vulnerability</topic> + <affects> +-- +2.42.0 + diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index c3b1509b15e5..25773c90c5a5 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,39 @@ + <vuln vid="833b469b-5247-11ee-9667-080027f5fec9"> + <topic>curl -- HTTP headers eat all memory</topic> + <affects> + <package> + <name>curl</name> + <range><lt>8.3.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>selmelc on hackerone reports:</p> + <blockquote cite="https://curl.se/docs/CVE-2023-38039.html"> + <p> + When curl retrieves an HTTP response, it stores the + incoming headers so that they can be accessed later via + the libcurl headers API. + </p> + <p> + However, curl did not have a limit in how many or how + large headers it would accept in a response, allowing a + malicious server to stream an endless series of headers + and eventually cause curl to run out of heap memory. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2023-38039</cvename> + <url>https://curl.se/docs/CVE-2023-38039.html HERE</url> + </references> + <dates> + <discovery>2023-09-13</discovery> + <entry>2023-09-13</entry> + </dates> + </vuln> + <vuln vid="b5508c08-547a-11ee-85eb-84a93843eb75"> <topic>Roundcube -- XSS vulnerability</topic> <affects>