Skip to content

deps: Bump com_github_curl -> 8.9.1 #35688

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Aug 14, 2024
Merged

Conversation

phlax
Copy link
Member

@phlax phlax commented Aug 13, 2024

Fix #35686

and resolve related CVE

CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

@repokitteh-read-only repokitteh-read-only bot added the deps Approval required for changes to Envoy's external dependencies label Aug 13, 2024
Copy link

CC @envoyproxy/dependency-shepherds: Your approval is needed for changes made to (bazel/.*repos.*\.bzl)|(bazel/dependency_imports\.bzl)|(api/bazel/.*\.bzl)|(.*/requirements\.txt)|(.*\.patch).
envoyproxy/dependency-shepherds assignee is @htuch

🐱

Caused by: #35688 was opened by phlax.

see: more, trace.

Signed-off-by: Ryan Northey <ryan@synca.io>
Copy link
Member

@htuch htuch left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I really wish this patch was gone! :)

@repokitteh-read-only repokitteh-read-only bot removed the deps Approval required for changes to Envoy's external dependencies label Aug 14, 2024
@htuch htuch merged commit 3299053 into envoyproxy:main Aug 14, 2024
47 of 48 checks passed
asingh-g pushed a commit to asingh-g/envoy that referenced this pull request Aug 20, 2024
Fix envoyproxy#35686

and resolve related CVE

```console
CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

```

Signed-off-by: Ryan Northey <ryan@synca.io>
Signed-off-by: asingh-g <abhisinghx@google.com>
phlax added a commit to phlax/envoy that referenced this pull request Aug 21, 2024
Fix envoyproxy#35686 

and resolve related CVE

```console
CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

```

Signed-off-by: Ryan Northey <ryan@synca.io>
phlax added a commit to phlax/envoy that referenced this pull request Aug 21, 2024
Fix envoyproxy#35686 

and resolve related CVE

```console
CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

```

Signed-off-by: Ryan Northey <ryan@synca.io>
phlax added a commit to phlax/envoy that referenced this pull request Aug 21, 2024
Fix envoyproxy#35686 

and resolve related CVE

```console
CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

```

Signed-off-by: Ryan Northey <ryan@synca.io>
phlax added a commit to phlax/envoy that referenced this pull request Aug 21, 2024
Fix envoyproxy#35686 

and resolve related CVE

```console
CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

```

Signed-off-by: Ryan Northey <ryan@synca.io>
phlax added a commit that referenced this pull request Aug 22, 2024
Fix #35686 

and resolve related CVE

```console
CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

```

Signed-off-by: Ryan Northey <ryan@synca.io>
phlax added a commit that referenced this pull request Aug 22, 2024
Fix #35686 

and resolve related CVE

```console
CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

```

Signed-off-by: Ryan Northey <ryan@synca.io>
phlax added a commit to phlax/envoy that referenced this pull request Aug 22, 2024
Fix envoyproxy#35686 

and resolve related CVE

```console
CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

```

Signed-off-by: Ryan Northey <ryan@synca.io>
phlax added a commit to phlax/envoy that referenced this pull request Aug 22, 2024
Fix envoyproxy#35686 

and resolve related CVE

```console
CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

```

Signed-off-by: Ryan Northey <ryan@synca.io>
phlax added a commit to phlax/envoy that referenced this pull request Aug 22, 2024
Fix envoyproxy#35686

and resolve related CVE

```console
CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

```

Signed-off-by: Ryan Northey <ryan@synca.io>

Signed-off-by: phlax <phlax@users.noreply.github.com>
phlax added a commit that referenced this pull request Aug 22, 2024
Fix #35686

and resolve related CVE

```console
CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

```

Signed-off-by: Ryan Northey <ryan@synca.io>

Signed-off-by: phlax <phlax@users.noreply.github.com>
phlax added a commit that referenced this pull request Aug 23, 2024
Fix #35686 

and resolve related CVE

```console
CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

```

Signed-off-by: Ryan Northey <ryan@synca.io>
krinkinmu pushed a commit to krinkinmu/envoy that referenced this pull request Nov 1, 2024
Fix envoyproxy#35686 

and resolve related CVE

```console
CVE-2024-7264 (com_github_curl@8.4.0)
  CVSS v3 score: 6.5
  Severity: MEDIUM
  Published date: 2024-07-31
  Last modified date: 2024-08-12
  Description: libcurl's ASN1 parser code has the `GTime2str()` function, used for
  parsing an ASN.1 Generalized Time field. If given an syntactically
  incorrect field, the parser might end up using -1 for the length of
  the *time fraction*, leading to a `strlen()` getting performed on a
  pointer to a heap buffer area that is not (purposely) null terminated.
  This flaw most likely leads to a crash, but can also lead to heap
  contents getting returned to the application when
  [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)
  is used.
  Affected CPEs:
  - cpe:2.3:a:haxx:libcurl:*

```

Signed-off-by: Ryan Northey <ryan@synca.io>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Newer release available com_github_curl: 8.9.1 (current: curl-8_4_0)
2 participants