ALT-BU-2021-3839-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2021-05241
Уязвимость программного средства для взаимодействия с серверами CURL, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-00312
Уязвимость программного средства для взаимодействия с серверами CURL, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2021-22876
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://curl.se/docs/CVE-2021-22876.html
- https://curl.se/docs/CVE-2021-22876.html
- https://hackerone.com/reports/1101882
- https://hackerone.com/reports/1101882
- [debian-lts-announce] 20210517 [SECURITY] [DLA 2664-1] curl security update
- [debian-lts-announce] 20210517 [SECURITY] [DLA 2664-1] curl security update
- FEDORA-2021-26a293c72b
- FEDORA-2021-26a293c72b
- FEDORA-2021-cab5c9befb
- FEDORA-2021-cab5c9befb
- FEDORA-2021-065371f385
- FEDORA-2021-065371f385
- GLSA-202105-36
- GLSA-202105-36
- https://security.netapp.com/advisory/ntap-20210521-0007/
- https://security.netapp.com/advisory/ntap-20210521-0007/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
Modified: 2024-11-21
CVE-2021-22890
curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://curl.se/docs/CVE-2021-22890.html
- https://curl.se/docs/CVE-2021-22890.html
- https://hackerone.com/reports/1129529
- https://hackerone.com/reports/1129529
- FEDORA-2021-26a293c72b
- FEDORA-2021-26a293c72b
- FEDORA-2021-cab5c9befb
- FEDORA-2021-cab5c9befb
- FEDORA-2021-065371f385
- FEDORA-2021-065371f385
- GLSA-202105-36
- GLSA-202105-36
- https://security.netapp.com/advisory/ntap-20210521-0007/
- https://security.netapp.com/advisory/ntap-20210521-0007/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
Closed bugs
[FR] Прошу добавить возможность задания UUID для ISO образа