-
Ticket
-
Resolution: Unresolved
-
Major
-
None
-
None
-
None
-
None
-
False
-
-
False
-
Very Likely
-
0
Why need this Task?
Flagging vulnerability on this advisory despite Bugzilla claiming it's not vulnerable.
Description:
From the advisory https://access.redhat.com/security/cve/cve-2024-6197, we notice that the Bugzilla states the following:
AFFECTED VERSIONS The vulnerable code can only be reached when curl is built to use GnuTLS, wolfSSL, Schannel or Secure Transport. Builds using other TLS backends are not vulnerable. Affected versions: curl 8.6.0 to and including 8.8.0 Not affected versions: curl < 8.6.0 and >= 8.9.0 Introduced-in: https://github.com/curl/curl/commit/623c3a8fa0bdb2751f1 (8.6.0).
We have a customer who is running curl on RHEL 10 and believe it shouldn't be vulnerable in this case then. The version installed is 8.9.0-r0. However, all versions are vulnerable according ot the CSAF VEX files. Can you please let me know if this is a bug?
- relates to
-
SECDATA-1188 csaf and csaf-vex is not updated
-
- To Do
-