USN-6429-2: curl vulnerability
Severity
Low
Vendor
VMware Tanzu
Versions Affected
- Canonical Ubuntu 16.04
- Canonical Ubuntu 18.04
- Canonical Ubuntu 22.04
Description
USN-6429-1 fixed a vulnerability in curl. This update provides the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: It was discovered that curl incorrectly handled cookies when an application duplicated certain handles. A local attacker could possibly create a cookie file and inject arbitrary cookies into subsequent connections. (CVE-2023-38546) Update Instructions: Run `sudo pro fix USN-6429-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcurl4-gnutls-dev - 7.47.0-1ubuntu2.19+esm10 libcurl4-openssl-dev - 7.47.0-1ubuntu2.19+esm10 libcurl3-gnutls - 7.47.0-1ubuntu2.19+esm10 libcurl4-doc - 7.47.0-1ubuntu2.19+esm10 libcurl3-nss - 7.47.0-1ubuntu2.19+esm10 libcurl4-nss-dev - 7.47.0-1ubuntu2.19+esm10 libcurl3 - 7.47.0-1ubuntu2.19+esm10 curl - 7.47.0-1ubuntu2.19+esm10 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro
CVEs contained in this USN include: CVE-2023-38546
Affected VMware Products and Versions
Severity is low unless otherwise noted.
-
Platform Automation Toolkit
- 4.4.x versions prior to 4.4.32
- 5.0.x versions prior to 5.0.25
- 5.1.x versions prior to 5.1.2
-
Isolation Segment
- 2.11.x versions prior to 2.11.41, or later versions with Xenial Stemcells prior to 621.730
- 2.13.x versions prior to 2.13.26, or later versions with Xenial Stemcells prior to 621.730
- 3.0.x versions prior to 3.0.19
- 4.0.x versions prior to 4.0.11+LTS-T
-
Operations Manager
- 2.10.x versions prior to 2.10.63
-
VMware Tanzu Application Service for VMs
- 2.11.x versions prior to 2.11.47, or later versions with Xenial Stemcells prior to 621.730
- 2.13.x versions prior to 2.13.29, or later versions with Xenial Stemcells prior to 621.730
- 3.0.x versions prior to 3.0.19
- 4.0.x versions prior to 4.0.11+LTS-T
Mitigation
Users of affected products are strongly encouraged to follow the mitigation below. On the Tanzu Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:
-
Platform Automation Toolkit
- 4.4.32
- 5.0.25
- 5.1.2
-
Isolation Segment
- 2.11.41, and upgrade Xenial Stemcells to 621.730 or greater
- 2.13.26, and upgrade Xenial Stemcells to 621.730 or greater
- 3.0.19
- 4.0.11+LTS-T
-
Operations Manager
- 2.10.63
-
VMware Tanzu Application Service for VMs
- 2.11.47, and upgrade Xenial Stemcells to 621.730 or greater
- 2.13.29, and upgrade Xenial Stemcells to 621.730 or greater
- 3.0.19
- 4.0.11+LTS-T
References
- https://ubuntu.com/security/CVE-2023-38546
- https://ubuntu.com/security/notices/USN-6429-2
- https://cloudfoundry.org/blog/usn-6429-2
History
2023-12-04: Initial vulnerability report published.