Bug 10595 - curl new security issue CVE-2013-2174
: curl new security issue CVE-2013-2174
Status: RESOLVED FIXED
Product: Mageia
Classification: Unclassified
Component: Security
: 3
: i586 Linux
: Normal Severity: normal
: ---
Assigned To: QA Team
: Sec team
: http://lwn.net/Vulnerabilities/556156/
: MGA2TOO has_procedure MGA2-32-OK MGA3...
: validated_update
:
:
  Show dependency treegraph
 
Reported: 2013-06-23 02:11 CEST by David Walser
Modified: 2014-05-08 18:06 CEST (History)
4 users (show)

See Also:
Source RPM: curl-7.28.1-6.mga3.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2013-06-23 02:11:29 CEST
Upstream has issued an advisory today (June 22):
http://curl.haxx.se/docs/adv_20130622.html

Updated package uploaded for Cauldron (by Funda).

Patched packages uploaded for Mageia 2 and Mageia 3 (by me).

Advisory:
========================

Updated curl packages fix security vulnerability:

libcurl is vulnerable to a case of bad checking of the input data which may
lead to heap corruption. The function curl_easy_unescape() decodes URL encoded
strings to raw binary data. URL encoded octets are represented with %HH
combinations where HH is a two-digit hexadecimal number. The decoded string is
written to an allocated memory area that the function returns to the caller
(CVE-2013-2174)

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
http://curl.haxx.se/docs/adv_20130622.html
========================

Updated packages in core/updates_testing:
========================
curl-7.24.0-1.2.mga2
libcurl4-7.24.0-1.2.mga2
libcurl-devel-7.24.0-1.2.mga2
curl-examples-7.24.0-1.2.mga2
curl-7.28.1-6.1.mga3
libcurl4-7.28.1-6.1.mga3
libcurl-devel-7.28.1-6.1.mga3
curl-examples-7.28.1-6.1.mga3

from SRPMS:
curl-7.24.0-1.2.mga2.src.rpm
curl-7.28.1-6.1.mga3.src.rpm

Reproducible: 

Steps to Reproduce:
Comment 1 Rémi Verschelde 2013-06-23 13:24:12 CEST
Tested that curl still works as expected on mga3 i586, following Claire's procedure from https://bugs.mageia.org/show_bug.cgi?id=4307#c11 (should we add it to the QA testing procedures on the wiki?)

If it's not enough, please remove MGA3-OK-32 from the whiteboard.
Comment 2 Rémi Verschelde 2013-06-23 13:33:21 CEST
Tested that urpmi --curl stills works as intended, too.
Comment 3 Rémi Verschelde 2013-06-23 14:47:49 CEST
Testing complete from mga2 i586 (VM).
Comment 4 martyn vidler 2013-06-23 16:01:17 CEST
MGA3 64 

Followed same test as Comment 1 all ran as expected
Comment 5 Samuel Verschelde 2013-06-26 11:52:15 CEST
Testing complete mga2 64
Comment 6 claire robinson 2013-06-26 12:03:13 CEST
Validating. Advisory uploaded.

Could sysadmin please push from 2 & 3 core/updates_testing to core/updates

Thanks!
Comment 7 Nicolas Vigier 2013-06-26 20:52:07 CEST
http://advisories.mageia.org/MGASA-2013-0188.html
Comment 8 Oden Eriksson 2013-06-27 11:09:05 CEST
FYI. There is a PoC for this:

wget "https://bugzilla.redhat.com/attachment.cgi?id=761296" -O
CVE-2013-2174-poc.c
gcc -o CVE-2013-2174-poc CVE-2013-2174-poc.c -lcurl
./CVE-2013-2174-poc

(tested, all ok)

Note You need to log in before you can comment on or make changes to this bug.