Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-28320
HistoryMay 26, 2023 - 9:15 p.m.

CVE-2023-28320

2023-05-2621:15:15
Debian Security Bug Tracker
security-tracker.debian.org
6

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

44.8%

A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using alarm() and siglongjmp(). When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.

OSVersionArchitecturePackageVersionFilename
Debian12allcurl<ย 7.88.1-10curl_7.88.1-10_all.deb
Debian11allcurl<=ย 7.74.0-1.3+deb11u11curl_7.74.0-1.3+deb11u11_all.deb
Debian10allcurl<=ย 7.64.0-4+deb10u2curl_7.64.0-4+deb10u2_all.deb
Debian999allcurl<ย 7.88.1-10curl_7.88.1-10_all.deb
Debian13allcurl<ย 7.88.1-10curl_7.88.1-10_all.deb

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

44.8%