125 Star 1 Fork 58

src-openEuler/mysql

CVE-2023-38545

已完成
CVE和安全问题
创建于  
2023-10-18 19:10

一、漏洞信息
漏洞编号:CVE-2023-38545
漏洞归属组件:mysql
漏洞归属的版本:8.0.17,8.0.23,8.0.24,8.0.26,8.0.27,8.0.28,8.0.29,8.0.30,8.0.35,8.0.37
CVSS V3.0分值:
BaseScore:9.8 High
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞简述:
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxyhandshake.When curl is asked to pass along the host name to the SOCKS5 proxy to allowthat to resolve the address instead of it getting done by curl itself, themaximum length that host name can be is 255 bytes.If the host name is detected to be longer, curl switches to local nameresolving and instead passes on the resolved address only. Due to this bug,the local variable that means let the host resolve the name could get thewrong value during a slow SOCKS5 handshake, and contrary to the intention,copy the too long host name to the target buffer instead of copying just theresolved address there.The target buffer being a heap based buffer, and the host name coming from theURL that curl has been told to operate with.
漏洞公开时间:2023-10-18 12:15:11
漏洞创建时间:2023-10-18 19:10:17
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2023-38545

更多参考(点击展开)
参考来源 参考链接 来源链接
support.hackerone.com http://seclists.org/fulldisclosure/2024/Jan/34
support.hackerone.com http://seclists.org/fulldisclosure/2024/Jan/37
support.hackerone.com http://seclists.org/fulldisclosure/2024/Jan/38
support.hackerone.com https://curl.se/docs/CVE-2023-38545.html
support.hackerone.com https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868
support.hackerone.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
support.hackerone.com https://security.netapp.com/advisory/ntap-20231027-0009/
support.hackerone.com https://security.netapp.com/advisory/ntap-20240201-0005/
support.hackerone.com https://support.apple.com/kb/HT214036
support.hackerone.com https://support.apple.com/kb/HT214057
support.hackerone.com https://support.apple.com/kb/HT214058
support.hackerone.com https://support.apple.com/kb/HT214063
support.hackerone.com https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/
redhat_bugzilla https://access.redhat.com/errata/RHSA-2023:5700 https://bugzilla.redhat.com/show_bug.cgi?id=2241933
redhat_bugzilla https://access.redhat.com/errata/RHSA-2023:5763 https://bugzilla.redhat.com/show_bug.cgi?id=2241933
redhat_bugzilla https://access.redhat.com/errata/RHSA-2023:6745 https://bugzilla.redhat.com/show_bug.cgi?id=2241933
redhat_bugzilla https://access.redhat.com/errata/RHSA-2023:7625 https://bugzilla.redhat.com/show_bug.cgi?id=2241933
redhat_bugzilla https://access.redhat.com/errata/RHSA-2023:7626 https://bugzilla.redhat.com/show_bug.cgi?id=2241933
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:0797 https://bugzilla.redhat.com/show_bug.cgi?id=2241933
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:2011 https://bugzilla.redhat.com/show_bug.cgi?id=2241933
debian https://security-tracker.debian.org/tracker/CVE-2023-38545
oracle https://www.oracle.com/security-alerts/cpuoct2023.html
curl https://curl.se/docs/CVE-2023-38545.html
gentoo https://security.gentoo.org/glsa/202310-12
anolis https://anas.openanolis.cn/cves/detail/CVE-2023-38545
cve_search https://curl.se/docs/CVE-2023-38545.html
cve_search https://security.netapp.com/advisory/ntap-20231027-0009/
cve_search https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
cve_search https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/
mageia http://advisories.mageia.org/MGASA-2023-0288.html
amazon_linux_explore https://access.redhat.com/security/cve/CVE-2023-38545 https://explore.alas.aws.amazon.com/CVE-2023-38545.html
amazon_linux_explore https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545 https://explore.alas.aws.amazon.com/CVE-2023-38545.html
snyk https://github.com/curl/curl/discussions/12026 https://security.snyk.io/vuln/SNYK-UNMANAGED-CURL-5931782
support.hackerone.com http://seclists.org/fulldisclosure/2024/Jan/34
support.hackerone.com http://seclists.org/fulldisclosure/2024/Jan/37
support.hackerone.com http://seclists.org/fulldisclosure/2024/Jan/38
support.hackerone.com https://security.netapp.com/advisory/ntap-20240201-0005/
support.hackerone.com https://support.apple.com/kb/HT214036
support.hackerone.com https://support.apple.com/kb/HT214057
support.hackerone.com https://support.apple.com/kb/HT214058
support.hackerone.com https://support.apple.com/kb/HT214063
support.hackerone.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
support.hackerone.com https://security.netapp.com/advisory/ntap-20231027-0009/
support.hackerone.com https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/
support.hackerone.com https://curl.se/docs/CVE-2023-38545.html

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
其它
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
http://seclists.org/fulldisclosure/2024/Jan/34 nvd
http://seclists.org/fulldisclosure/2024/Jan/37 nvd
http://seclists.org/fulldisclosure/2024/Jan/38 nvd
https://curl.se/docs/CVE-2023-38545.html nvd
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/ nvd
https://security.netapp.com/advisory/ntap-20231027-0009/ nvd
https://security.netapp.com/advisory/ntap-20240201-0005/ nvd
https://support.apple.com/kb/HT214036 nvd
https://support.apple.com/kb/HT214057 nvd
https://support.apple.com/kb/HT214058 nvd
https://support.apple.com/kb/HT214063 nvd
https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/ nvd
curl https://github.com/curl/curl/commit/fb4415d8aee6c1 https://github.com/curl/curl/commit/4a4b63daaa curl
curl https://curl.se/docs/CVE-2023-38545_patches.zip https://github.com/curl/curl/commit/4a4b63daaa curl
https://github.com/curl/curl/commit/fb4415d8aee6c1045be932a34fe6107c2f5ed147 debian
curl https://github.com/curl/curl/commit/fb4415d8aee6c1 curl
curl https://curl.se/docs/CVE-2023-38545_patches.zip curl

二、漏洞分析结构反馈
影响性分析说明:
当前版本受影响,在8.0.35版本修复
openEuler评分:
7.5
Vector:CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP4(8.0.28):受影响
2.openEuler-22.03-LTS-SP1(8.0.37):受影响
3.openEuler-22.03-LTS-SP3(8.0.37):受影响
4.master(8.0.27):不受影响
5.openEuler-24.03-LTS(8.0.35):不受影响
6.openEuler-24.03-LTS-Next(8.0.37):不受影响
7.openEuler-22.03-LTS-SP4(8.0.37):不受影响

修复是否涉及abi变化(是/否):
1.master(8.0.27):否
2.openEuler-20.03-LTS-SP4(8.0.28):否
3.openEuler-22.03-LTS-SP1(8.0.37):否
4.openEuler-22.03-LTS-SP3(8.0.37):否
5.openEuler-24.03-LTS(8.0.35):否
6.openEuler-24.03-LTS-Next(8.0.37):否
7.openEuler-22.03-LTS-SP4(8.0.37):否

三、漏洞修复
安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2024-2072

评论 (16)

majun-bot 创建了CVE和安全问题 2年前
majun-bot 添加了
 
CVE/UNFIXED
标签
2年前
展开全部操作日志
openeuler-ci-bot 添加了
 
sig/Others
标签
2年前
参考网址 关联pr 状态 补丁链接
https://nvd.nist.gov/vuln/detail/CVE-2023-38545
https://ubuntu.com/security/CVE-2023-38545NoneNonehttps://github.com/curl/curl/commit/4a4b63daaa
https://discourse.ubuntu.com/c/ubuntu-pro
https://www.opencve.io/cve/CVE-2023-38545
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2023-38545
https://security-tracker.debian.org/tracker/CVE-2023-38545NoneNonehttps://github.com/curl/curl/commit/4a4b63daaa
https://github.com/curl/curl/commit/fb4415d8aee6c1045be932a34fe6107c2f5ed147

说明:补丁链接仅供初步排查参考,实际可用性请人工再次确认,补丁下载验证可使用CVE补丁工具
若补丁不准确,烦请在此issue下评论 '/report-patch 参考网址 补丁链接1,补丁链接2' 反馈正确信息,便于我们不断优化工具,不胜感激。
如 /report-patch https://security-tracker.debian.org/tracker/CVE-2021-3997 https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1

openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 移除了
 
sig/Others
标签
2年前

根据orcale官网说明,影响8.0.34及之前的版本,目前8.0.35未发布,暂时挂起
输入图片说明
https://www.oracle.com/security-alerts/cpuoct2023.html

wk333 任务状态待办的 修改为已挂起 2年前
openeuler-ci-bot 计划开始日期设置为2023-10-19 2年前
openeuler-ci-bot 计划截止日期设置为2023-11-02 2年前
openeuler-ci-bot 优先级设置为主要 2年前

影响性分析说明:
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxyhandshake.When curl is asked to pass along the host name to the SOCKS5 proxy to allowthat to resolve the address instead of it getting done by curl itself, themaximum length that host name can be is 255 bytes.If the host name is detected to be longer, curl switches to local nameresolving and instead passes on the resolved address only. Due to this bug,the local variable that means let the host resolve the name could get thewrong value during a slow SOCKS5 handshake, and contrary to the intention,copy the too long host name to the target buffer instead of copying just theresolved address there.The target buffer being a heap based buffer, and the host name coming from theURL that curl has been told to operate with.

openEuler评分:
7.5
Vector:CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(8.0.28): 受影响
2.openEuler-20.03-LTS-SP3(8.0.28): 受影响
3.openEuler-20.03-LTS-SP4(8.0.28): 受影响
4.openEuler-22.03-LTS(8.0.28): 受影响
5.openEuler-22.03-LTS-SP1(8.0.29): 受影响
6.openEuler-22.03-LTS-SP2(8.0.29): 受影响
7.openEuler-22.03-LTS-SP3(8.0.29):受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(8.0.28): 否
2.openEuler-20.03-LTS-SP3(8.0.28): 否
3.openEuler-20.03-LTS-SP4: 否
4.openEuler-22.03-LTS(8.0.28): 否
5.openEuler-22.03-LTS-SP1(8.0.29): 否
6.openEuler-22.03-LTS-SP2(8.0.29): 否
7.openEuler-22.03-LTS-SP3(8.0.29):否

starlet_dx 任务状态已挂起 修改为待办的 2年前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
2年前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
2年前

影响性分析说明:
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxyhandshake.When curl is asked to pass along the host name to the SOCKS5 proxy to allowthat to resolve the address instead of it getting done by curl itself, themaximum length that host name can be is 255 bytes.If the host name is detected to be longer, curl switches to local nameresolving and instead passes on the resolved address only. Due to this bug,the local variable that means let the host resolve the name could get thewrong value during a slow SOCKS5 handshake, and contrary to the intention,copy the too long host name to the target buffer instead of copying just theresolved address there.The target buffer being a heap based buffer, and the host name coming from theURL that curl has been told to operate with.

openEuler评分:
7.5
Vector:CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(8.0.28): 受影响
2.openEuler-20.03-LTS-SP3(8.0.28): 受影响
3.openEuler-20.03-LTS-SP4(8.0.28): 受影响
4.openEuler-22.03-LTS(8.0.28): 受影响
5.openEuler-22.03-LTS-SP1(8.0.29): 受影响
6.openEuler-22.03-LTS-SP2(8.0.29): 受影响
7.openEuler-22.03-LTS-SP3(8.0.29):受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(8.0.28): 是
2.openEuler-20.03-LTS-SP3(8.0.28): 是
3.openEuler-20.03-LTS-SP4: 是
4.openEuler-22.03-LTS(8.0.28): 是
5.openEuler-22.03-LTS-SP1(8.0.29): 是
6.openEuler-22.03-LTS-SP2(8.0.29): 是
7.openEuler-22.03-LTS-SP3(8.0.29):是

openeuler-ci-bot 修改了描述 2年前

影响性分析说明:
当前版本受影响,在8.0.35版本修复

受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(8.0.28): 受影响
2.openEuler-20.03-LTS-SP3(8.0.28): 受影响
3.openEuler-20.03-LTS-SP4(8.0.28): 受影响
4.openEuler-22.03-LTS(8.0.28): 受影响
5.openEuler-22.03-LTS-SP1(8.0.29): 受影响
6.openEuler-22.03-LTS-SP2(8.0.29): 受影响
7.openEuler-22.03-LTS-SP3(8.0.29):受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(8.0.28): 是
2.openEuler-20.03-LTS-SP3(8.0.28): 是
3.openEuler-20.03-LTS-SP4: 是
4.openEuler-22.03-LTS(8.0.28): 是
5.openEuler-22.03-LTS-SP1(8.0.29): 是
6.openEuler-22.03-LTS-SP2(8.0.29): 是
7.openEuler-22.03-LTS-SP3(8.0.29):是

openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前

/approve
NVD官网修改评分为9.8,经讨论还是按照原本的7.5评分

openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-sync-bot 通过合并 Pull Request !114: [sync] PR-106: Upgrade to 8.0.35 for fix cves任务状态待办的 修改为已完成 2年前
openeuler-ci-bot 任务状态已完成 修改为待办的 2年前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
2年前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 2年前
openeuler-ci-bot 修改了描述 1年前

已通过安全委员会评审,挂起此Issue

starlet_dx 任务状态待办的 修改为已挂起 1年前
starlet_dx 任务状态已挂起 修改为待办的 10个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
10个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
10个月前
wk333-wk333 wk333 成员 10个月前

受影响版本排查(受影响/不受影响):
1.master:不受影响
2.openEuler-20.03-LTS-SP4:受影响
3.openEuler-22.03-LTS-SP1:受影响
4.openEuler-22.03-LTS-SP3:受影响
5.openEuler-24.03-LTS:不受影响
6.openEuler-24.03-LTS-Next:不受影响
7.openEuler-22.03-LTS-SP4:不受影响

修复是否涉及abi变化(是/否):
1.master:否
2.openEuler-20.03-LTS-SP4:否
3.openEuler-22.03-LTS-SP1:否
4.openEuler-22.03-LTS-SP3:否
5.openEuler-24.03-LTS:否
6.openEuler-24.03-LTS-Next:否
7.openEuler-22.03-LTS-SP4:否

openeuler-ci-bot 修改了描述 10个月前
starlet_dx 任务状态待办的 修改为已完成 10个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
10个月前
openeuler-ci-bot 添加了
 
CVE/FIXED
标签
10个月前
openeuler-ci-bot 修改了描述 9个月前

登录 后才可以发表评论

状态
负责人
项目
预计工期 (小时)
开始日期   -   截止日期
-
置顶选项
优先级
里程碑
分支
参与者(5)
5329419 openeuler ci bot 1632792936 wk333-wk333 starlet_dx-starlet-dx Luoyukai-luoyukai majun-bot-openMajun_admin
1
https://gitee.com/src-openeuler/mysql.git
git@gitee.com:src-openeuler/mysql.git
src-openeuler
mysql
mysql

搜索帮助