Hi Team,
We have started to recieve a large number of reports from PCI scans in relation to the below packages which are provided as part of the Imunify360 Installation from your repository.
alt-curlssl11-7.87.0-1.el7.x86_64
alt-libcurlssl11-7.87.0-1.el7.x86_64
The vulnerability appears to be in relation to the below.
VULNERABILITY
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.
When curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.
Upon investigation it appears this is likely related to the below CVE
The servers in question are largely running CentOS7 and not Cloud Linux so may not be vulnerable based on the Redhat post.
Could you please review and confirm if they are vulnerable and is so will a patch be be in development
Thanks in advance.
We have started to recieve a large number of reports from PCI scans in relation to the below packages which are provided as part of the Imunify360 Installation from your repository.
alt-curlssl11-7.87.0-1.el7.x86_64
alt-libcurlssl11-7.87.0-1.el7.x86_64
The vulnerability appears to be in relation to the below.
VULNERABILITY
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.
When curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.
Upon investigation it appears this is likely related to the below CVE
The servers in question are largely running CentOS7 and not Cloud Linux so may not be vulnerable based on the Redhat post.
Could you please review and confirm if they are vulnerable and is so will a patch be be in development
Thanks in advance.
Comment