[Debian] CVE: CVE-2022-32221/CVE-2022-43552: curl: multi CVEs

Bug #2006412 reported by Yue Tao
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
StarlingX
Fix Released
Medium
hqbai

Bug Description

CVE-2022-32221: https://nvd.nist.gov/vuln/detail/CVE-2022-32221

When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.

CVE-2022-43552 https://nvd.nist.gov/vuln/detail/CVE-2022-43552

A use after free vulnerability exists in curl <7.87.0. Curl can be asked to tunnel virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.

Score:
cve_id status cvss3Score av ac pr ui ai
CVE-2022-32221 fixed 9.8 N L N N H

CVE-2022-43552 fixed 7.5 N L N N H

References:
['curl_7.74.0-1.3+deb11u3_amd64.deb===>curl_7.74.0-1.3+deb11u5_amd64.deb', 'libcurl3-gnutls_7.74.0-1.3+deb11u3_amd64.deb===>libcurl3-gnutls_7.74.0-1.3+deb11u5_amd64.deb', 'libcurl4_7.74.0-1.3+deb11u3_amd64.deb===>libcurl4_7.74.0-1.3+deb11u5_amd64.deb', 'libcurl4-gnutls-dev_7.74.0-1.3+deb11u3_amd64.deb===>libcurl4-gnutls-dev_7.74.0-1.3+deb11u5_amd64.deb', 'libcurl4-openssl-dev_7.74.0-1.3+deb11u3_amd64.deb===>libcurl4-openssl-dev_7.74.0-1.3+deb11u5_amd64.deb']

CVE References

Yue Tao (wrytao)
information type: Public → Public Security
tags: added: stx.8.0 stx.security
Ghada Khalil (gkhalil)
tags: added: stx.9.0
removed: stx.8.0
Revision history for this message
Ghada Khalil (gkhalil) wrote :

screening: moving to stx.9.0 as current commitment is to only fix CVEs in the stx main branch. The r/stx.8.0 branch has already been created.

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to tools (master)

Fix proposed to branch: master
Review: https://review.opendev.org/c/starlingx/tools/+/874187

Changed in starlingx:
status: New → In Progress
Yue Tao (wrytao)
summary: - [Debian] CVE: CVE-2022-32221: curl: cause it to misbehave and either
- send off the wrong data or use memory
+ [Debian] CVE: CVE-2022-32221/CVE-2022-43552: curl: multi CVEs
description: updated
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to tools (master)

Reviewed: https://review.opendev.org/c/starlingx/tools/+/874187
Committed: https://opendev.org/starlingx/tools/commit/1340364ee7e639605b46ec216f250a9cbcdb5940
Submitter: "Zuul (22348)"
Branch: master

commit 1340364ee7e639605b46ec216f250a9cbcdb5940
Author: Haiqing Bai <email address hidden>
Date: Fri Feb 17 10:47:07 2023 +0800

    Debian: curl: CVE-2022-32221,CVE-2022-43552

    Upgrade curl, libcurl3-gnutls, libcurl4, libcurl4-gnutls-dev,
    libcurl4-openssl-dev from "7.74.0-1.3+deb11u3" to
    "7.74.0-1.3+deb11u5" to fix below CVEs:
    CVE-2022-32221
    CVE-2022-43552

    Refer to:
    https://security-tracker.debian.org/tracker/DSA-5330-1
    https://security-tracker.debian.org/tracker/DLA-3288-1

    Test Plan:
    a. In builder, run:
       $rm /import/mirrors/starlingx/binaries/curl*
       $rm /import/mirrors/starlingx/binaries/libcurl*
       $downloader -b
       $repo_manage.py list_pkgs -r deb-local-binary
       Check the required curl and libcurl packages are in the repository
    b. $build-pkgs --clean --parallel 10
       $build-image
       Boot the iso image on board and check that the new
       packages have been installed.

    Closes-Bug: 2006412

    Signed-off-by: Haiqing Bai <email address hidden>
    Change-Id: Ie53841c64eda404856e513c337f98f0125122c98

Changed in starlingx:
status: In Progress → Fix Released
Ghada Khalil (gkhalil)
Changed in starlingx:
importance: Undecided → Medium
assignee: nobody → hqbai (hbai)
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.