<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerabilities on libcurl.dll in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2160958#M29072</link>
    <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/252695"&gt;@Sangeeta&lt;/a&gt;&amp;nbsp;This is not officially found by Qlik what I see,&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2120325" target="_blank"&gt;https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2120325&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you feel anything, please reach to your success engineer from Qlik.&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jan 2024 08:59:53 GMT</pubDate>
    <dc:creator>Anil_Babu_Samineni</dc:creator>
    <dc:date>2024-01-12T08:59:53Z</dc:date>
    <item>
      <title>Vulnerabilities on libcurl.dll</title>
      <link>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2160635#M29071</link>
      <description>&lt;P&gt;&lt;SPAN&gt;During our regular scans we found some vulnerabilities on libcurl.dll (cve mentioned below), we are using the qliksense version - 14.78.23 (August 2022 patch 16).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The recommendation is to upgrade to libcurl 8.4.0. Please suggest if there are any patches available for upgrading libcurl.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;CVE-2023-38545 (Heap Buffer Overflow)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;CVE-2023-38546 (Cookie Injection)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 14:50:40 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2160635#M29071</guid>
      <dc:creator>Sangeeta</dc:creator>
      <dc:date>2024-01-11T14:50:40Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities on libcurl.dll</title>
      <link>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2160958#M29072</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/252695"&gt;@Sangeeta&lt;/a&gt;&amp;nbsp;This is not officially found by Qlik what I see,&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2120325" target="_blank"&gt;https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2120325&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you feel anything, please reach to your success engineer from Qlik.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 08:59:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2160958#M29072</guid>
      <dc:creator>Anil_Babu_Samineni</dc:creator>
      <dc:date>2024-01-12T08:59:53Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities on libcurl.dll</title>
      <link>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2432387#M29073</link>
      <description>&lt;P&gt;Same here:&amp;nbsp;CVE-2023-38545, Qlik Sense Enterprise on Windows February 2024 14.173.3&lt;/P&gt;
&lt;P&gt;Scan found affected&amp;nbsp;&lt;SPAN&gt;libcurl.dll&amp;nbsp;versions in&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;C:\Program Files\Common Files\Qlik\Custom Data\QvOdbcConnectorPackage\...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Search of Qlik Community did not produce any references to&amp;nbsp;CVE-2023-38545.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What would be a solution here?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 13:17:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2432387#M29073</guid>
      <dc:creator>dmitri_volkov</dc:creator>
      <dc:date>2024-03-19T13:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities on libcurl.dll</title>
      <link>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2501455#M29074</link>
      <description>&lt;P&gt;Hi Sangeeta,&lt;/P&gt;
&lt;P&gt;I don’t think Qlik will provide a patch since release August 2022 is no longer supported since August 2024.&lt;/P&gt;
&lt;P&gt;I think you need to update your Qlik Environment. The libcurl.dll ist stored in some places on Windows, Qlik and Postgres related paths (search on your filesystem and check the file properties “Details”- Version).&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Thomas_Rieck_MW_0-1736950238352.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/176500i971D9EF1A5CE63C5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Thomas_Rieck_MW_0-1736950238352.png" alt="Thomas_Rieck_MW_0-1736950238352.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On my VM for testing I have May 2024 and PostgrSQL 14 and none of the different libcurl.dlls are lower than 8.4.0 …&lt;/P&gt;
&lt;P&gt;Best reagrds&lt;/P&gt;
&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 14:10:49 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2501455#M29074</guid>
      <dc:creator>Thomas_Rieck_MW</dc:creator>
      <dc:date>2025-01-15T14:10:49Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities on libcurl.dll</title>
      <link>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2501472#M29075</link>
      <description>&lt;P&gt;This is an old post, we moved to May2024 patch 11 already and now there are new vulnerabilities on 8.4.0 which is fixed in version 8.9.1 so we are waiting for new patch.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 15:09:35 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2501472#M29075</guid>
      <dc:creator>Sangeeta</dc:creator>
      <dc:date>2025-01-15T15:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities on libcurl.dll</title>
      <link>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2510898#M31739</link>
      <description>&lt;P&gt;Another vulnerability on libcurl&amp;nbsp;&lt;A href="https://curl.se/docs/CVE-2024-7264.html" target="_blank"&gt;https://curl.se/docs/CVE-2024-7264.html&lt;BR /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This is being picked up on our May2024 system :&lt;/P&gt;&lt;P&gt;\QvOdbcConnectorPackage\presto\lib\LibCurl64.DllA\libcurl.dll&lt;BR /&gt;Installed version : 8.1.2.0 Fixed version: 8.9.1&lt;/P&gt;&lt;P&gt;Can someone check which version of libcurl.dll is shipped with November 2024?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2025 22:06:54 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2510898#M31739</guid>
      <dc:creator>shaun_lombard</dc:creator>
      <dc:date>2025-03-20T22:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities on libcurl.dll</title>
      <link>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2516468#M31868</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/5346"&gt;@shaun_lombard&lt;/a&gt;&amp;nbsp;the connector driver is compiled with OpenSSL and as such not vulnerable to CVE-2024-7264&lt;/P&gt;
&lt;P&gt;only those models are&lt;/P&gt;
&lt;P&gt;This parser bug was actually introduced in curl&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://curl.se/docs/vuln-7.32.0.html" target="_blank"&gt;7.32.0&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;but was then used only by the GSKit TLS backend which is no longer supported. The functionality was later brought to other TLS backends in different versions, so this bug affects curl built with different backends starting in different versions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;GnuTLS since&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://curl.se/docs/vuln-7.42.0.html" target="_blank"&gt;7.42.0&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Schannel since&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://curl.se/docs/vuln-7.50.0.html" target="_blank"&gt;7.50.0&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Secure Transport since&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://curl.se/docs/vuln-7.79.0.html" target="_blank"&gt;7.79.0&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;mbedTLS since&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://curl.se/docs/vuln-8.9.0.html" target="_blank"&gt;8.9.0&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 id="solution"&gt;&amp;nbsp;&lt;/H2&gt;</description>
      <pubDate>Fri, 02 May 2025 06:48:06 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-on-libcurl-dll/m-p/2516468#M31868</guid>
      <dc:creator>Sebastian_Linser</dc:creator>
      <dc:date>2025-05-02T06:48:06Z</dc:date>
    </item>
  </channel>
</rss>

