ALT-PU-2022-4910-1
Package curl updated to version 7.83.1-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2022-03177
Уязвимость реализации конфигурации —no-clobber и --remove-on-error утилиты командной строки cURL, позволяющая нарушителю удалить произвольные файлы
BDU:2022-03178
Уязвимость утилиты командной строки cURL, связанная с ошибкой установки файлов cookie для доменов верхнего уровня (TLD), позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-03180
Уязвимость реализации конфигурации запроса информации о SSL-сертификате CURLOPT_CERTINFO утилиты командной строки cURL, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2022-03184
Уязвимость утилиты командной строки cURL, связанная с ошибками кодирования URL-адресов, позволяющая нарушителю перенаправить пользователя на другой URL-адрес
BDU:2022-03185
Уязвимость реализации протоколов TLS и SSH утилиты командной строки cURL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-03187
Уязвимость реализации механизма HSTS (HTTP Strict Transport Security) утилиты командной строки cURL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2022-27778
A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no-clobber` is used together with `--remove-on-error`.
- https://hackerone.com/reports/1553598
- https://hackerone.com/reports/1553598
- https://security.netapp.com/advisory/ntap-20220609-0009/
- https://security.netapp.com/advisory/ntap-20220609-0009/
- https://security.netapp.com/advisory/ntap-20220729-0004/
- https://security.netapp.com/advisory/ntap-20220729-0004/
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2022-27779
libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.
Modified: 2024-11-21
CVE-2022-27780
The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.
Modified: 2024-11-21
CVE-2022-27781
libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.
- https://hackerone.com/reports/1555441
- https://hackerone.com/reports/1555441
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- GLSA-202212-01
- GLSA-202212-01
- https://security.netapp.com/advisory/ntap-20220609-0009/
- https://security.netapp.com/advisory/ntap-20220609-0009/
- DSA-5197
- DSA-5197
Modified: 2024-11-21
CVE-2022-27782
libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.
- [oss-security] 20230320 [SECURITY ADVISORY] curl: CVE-2023-27538: SSH connection too eager reuse still
- [oss-security] 20230320 [SECURITY ADVISORY] curl: CVE-2023-27538: SSH connection too eager reuse still
- https://hackerone.com/reports/1555796
- https://hackerone.com/reports/1555796
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- GLSA-202212-01
- GLSA-202212-01
- https://security.netapp.com/advisory/ntap-20220609-0009/
- https://security.netapp.com/advisory/ntap-20220609-0009/
- DSA-5197
- DSA-5197
Modified: 2024-11-21
CVE-2022-30115
Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.
- [oss-security] 20221026 [SECURITY ADVISORY] CVE-2022-42916: HSTS bypass via IDN (curl)
- [oss-security] 20221026 [SECURITY ADVISORY] CVE-2022-42916: HSTS bypass via IDN (curl)
- [oss-security] 20221221 curl: CVE-2022-43551: Another HSTS bypass via IDN
- [oss-security] 20221221 curl: CVE-2022-43551: Another HSTS bypass via IDN
- https://hackerone.com/reports/1557449
- https://hackerone.com/reports/1557449
- GLSA-202212-01
- GLSA-202212-01
- https://security.netapp.com/advisory/ntap-20220609-0009/
- https://security.netapp.com/advisory/ntap-20220609-0009/