Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

vulns: add curl and libcurl vulns #1275

Merged
merged 2 commits into from
Oct 11, 2023
Merged

vulns: add curl and libcurl vulns #1275

merged 2 commits into from
Oct 11, 2023

Conversation

RTann
Copy link
Collaborator

@RTann RTann commented Oct 11, 2023

I ran a genesis dump without these changes (see #1276). You'll notice in that PR in the genesis dump logs, you will find logs saying CVE-2023-38545 and CVE-2023-38546 are missing for several distributions. With this PR, they are no longer missing, as we utilize the CVSSv3 scores from our "NVD" manual entries.

Note: this does not affect Red Hat, as they track CVSS scores, themselves

@RTann RTann added the generate-dumps-on-pr Generates the image based on dumps from the PR label Oct 11, 2023
@RTann RTann force-pushed the curl-vulns-10-11-23 branch from 321a31e to f338fed Compare October 11, 2023 17:26
@RTann
Copy link
Collaborator Author

RTann commented Oct 11, 2023

/retest

@ghost
Copy link

ghost commented Oct 11, 2023

Images are ready for the commit at f338fed.

To use the images, use the tag 2.31.x-20-gf338fedd01.

@RTann RTann requested review from dcaravel and a team October 11, 2023 20:29
@RTann
Copy link
Collaborator Author

RTann commented Oct 11, 2023

postgres=# select v.name, n.name, v.metadata from vulnerability v join namespace n on v.namespace_id = n.id where v.name = 'CVE-2023-38545';
      name      |      name       |                                                           
                                                                                   metadata   
                                                                                              
                                             
----------------+-----------------+-----------------------------------------------------------
----------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------
---------------------------------------------
 CVE-2023-38545 | debian:12       | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | debian:unstable | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | debian:13       | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | debian:11       | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | debian:10       | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | alpine:v3.17    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | alpine:v3.15    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | alpine:v3.16    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | alpine:v3.18    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | alpine:edge     | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | ubuntu:16.04    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | ubuntu:14.04    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | ubuntu:23.04    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | ubuntu:18.04    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | ubuntu:22.04    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38545 | ubuntu:20.04    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":5.9,"Score":7.5,"Vec
tors":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},"LastModifiedDateTime":"2023-10-11T00:00
Z","PublishedDateTime":"2023-10-11T00:00Z"}}
(16 rows)
postgres=# select v.name, n.name, v.metadata from vulnerability v join namespace n on v.namespace_id = n.id where v.name = 'CVE-2023-38546';
      name      |      name       |                                                           
                                                                                              
                                                                                              
                         metadata                                                             
                                                                                              
                                                                                              
                        
----------------+-----------------+-----------------------------------------------------------
----------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------
------------------------
 CVE-2023-38546 | debian:unstable | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | debian:13       | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | debian:10       | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | debian:11       | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | debian:12       | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | alpine:v3.17    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | alpine:v3.15    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | alpine:v3.18    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | alpine:v3.16    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | alpine:edge     | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | centos:6        | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"","PublishedDateTi
me":"2023-10-11T00:00:00Z"},"Red Hat":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,"Scor
e":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vectors":"
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"","PublishedDateTime":"
2023-10-11T00:00:00Z"}}
 CVE-2023-38546 | centos:8        | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"","PublishedDateTi
me":"2023-10-11T00:00:00Z"},"Red Hat":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,"Scor
e":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vectors":"
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"","PublishedDateTime":"
2023-10-11T00:00:00Z"}}
 CVE-2023-38546 | centos:7        | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"","PublishedDateTi
me":"2023-10-11T00:00:00Z"},"Red Hat":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,"Scor
e":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vectors":"
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"","PublishedDateTime":"
2023-10-11T00:00:00Z"}}
 CVE-2023-38546 | ubuntu:16.04    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | ubuntu:14.04    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | ubuntu:23.04    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | ubuntu:18.04    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | ubuntu:20.04    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
 CVE-2023-38546 | ubuntu:22.04    | {"NVD":{"CVSSv2":{"ExploitabilityScore":0,"ImpactScore":0,
"Score":0,"Vectors":""},"CVSSv3":{"ExploitabilityScore":1.6,"ImpactScore":3.4,"Score":5,"Vecto
rs":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},"LastModifiedDateTime":"2023-10-11T00:00Z"
,"PublishedDateTime":"2023-10-11T00:00Z"}}
(19 rows)

Copy link
Contributor

@daynewlee daynewlee left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.
Do we need to remove these CVEs after OVAL feeds get updated?

Description: []*schema.CVEJSON40LangString{
{
Lang: "en",
Value: "CWE-611",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Per curl.se this should be CWE-122 Heap-based Buffer Overflow

Comment on lines 982 to 986
{
Cpe23Uri: `cpe:2.3:a:ubuntu:curl:*:*:*:*:*:*:*:*`,
VersionEndExcluding: "8.4.0",
Vulnerable: true,
},
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should add VersionStartIncluding: "7.69.0"

{
CPEMatch: []*schema.NVDCVEFeedJSON10DefCPEMatch{
{
Cpe23Uri: `cpe:2.3:a:ubuntu:curl:*:*:*:*:*:*:*:*`,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is the vendor ubuntu in the CPE line here accurate? See other curl vulns use haxx as the vendor.

Comment on lines 995 to 1009
AttackComplexity: "LOW",
AttackVector: "NETWORK",
AvailabilityImpact: "HIGH",
BaseScore: 7.5,
BaseSeverity: "HIGH",
ConfidentialityImpact: "HIGH",
IntegrityImpact: "HIGH",
PrivilegesRequired: "NONE",
Scope: "UNCHANGED",
UserInteraction: "REQUIRED",
VectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
Version: "3.1",
},
ExploitabilityScore: 1.6,
ImpactScore: 5.9,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Assuming this was sourced from RH data?

Based on vector AC:H, AttackComplexity should be HIGH

Description: []*schema.CVEJSON40LangString{
{
Lang: "en",
Value: "CWE-611",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Per curl.se - CWE-73: External Control of File Name or Path

Comment on lines 1056 to 1059
Name: "https://github.com/curl/curl/discussions/12026",
Refsource: "MISC",
Tags: []string{"Patch", "Third Party Advisory"},
URL: "https://github.com/curl/curl/discussions/12026",
Copy link
Contributor

@dcaravel dcaravel Oct 11, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should these links be https://curl.se/docs/CVE-2023-38546.html instead?

Comment on lines 969 to 972
Name: "https://github.com/curl/curl/discussions/12026",
Refsource: "MISC",
Tags: []string{"Patch", "Third Party Advisory"},
URL: "https://github.com/curl/curl/discussions/12026",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should these links be https://curl.se/docs/CVE-2023-38545.html instead?

Comment on lines 1070 to 1072
Cpe23Uri: `cpe:2.3:a:ubuntu:libcurl:*:*:*:*:*:*:*:*`,
VersionEndExcluding: "8.4.0",
Vulnerable: true,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should add VersionStartIncluding: "7.9.1"

@RTann RTann removed the generate-dumps-on-pr Generates the image based on dumps from the PR label Oct 11, 2023
@RTann RTann requested a review from dcaravel October 11, 2023 21:34
@RTann RTann merged commit 9759f12 into master Oct 11, 2023
@RTann RTann deleted the curl-vulns-10-11-23 branch October 11, 2023 22:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants