ALT-BU-2022-4891-1
Branch sisyphus_riscv64 update bulletin.
Package curl updated to version 7.83.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-03036
Уязвимость реализации протокола OAUTH2 утилиты командной строки cURL, позволяющая нарушителю обойти процесс аутентификации и получить несанкционированный доступ к защищаемой информации
BDU:2022-03038
Уязвимость реализации функции сопоставления конфигурации утилиты командной строки cURL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-03040
Уязвимость утилиты командной строки cURL, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-03041
Уязвимость утилиты командной строки cURL, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2022-22576
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
- https://hackerone.com/reports/1526328
- https://hackerone.com/reports/1526328
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- GLSA-202212-01
- GLSA-202212-01
- https://security.netapp.com/advisory/ntap-20220609-0008/
- https://security.netapp.com/advisory/ntap-20220609-0008/
- DSA-5197
- DSA-5197
Modified: 2024-11-21
CVE-2022-27774
An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.
- https://hackerone.com/reports/1543773
- https://hackerone.com/reports/1543773
- [debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update
- [debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update
- GLSA-202212-01
- GLSA-202212-01
- https://security.netapp.com/advisory/ntap-20220609-0008/
- https://security.netapp.com/advisory/ntap-20220609-0008/
- DSA-5197
- DSA-5197
Modified: 2024-11-21
CVE-2022-27775
An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.
Modified: 2024-11-21
CVE-2022-27776
A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.
- https://hackerone.com/reports/1547048
- https://hackerone.com/reports/1547048
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- FEDORA-2022-f83aec6d57
- FEDORA-2022-f83aec6d57
- FEDORA-2022-bca2c95559
- FEDORA-2022-bca2c95559
- GLSA-202212-01
- GLSA-202212-01
- https://security.netapp.com/advisory/ntap-20220609-0008/
- https://security.netapp.com/advisory/ntap-20220609-0008/
- DSA-5197
- DSA-5197
Package x11presetdrv updated to version 2.1.3-alt1 for branch sisyphus_riscv64.
Closed bugs
После обновления ядра слетает текущая версия драйвера nvidia