[CLSA-2022:1656430138] Fixed CVEs in curl: CVE-2022-27780, CVE-2022-27781, CVE-2022-27782
Type:
security
Severity:
Important
Release date:
2022-06-28
Description:
- CVE-2022-27782: check additional TLS or SSH connection parameters that should have prohibited connection reuse - CVE-2022-27781: add limit of certificates which can be traversed breaking possible infinite loop - CVE-2022-27780: exclude malicious characters from url to prevent incorrect address decoding
Updated packages:
  • curl-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
    sha:850650ec2b94671182651a51aa38c204cd210fda
  • libcurl-minimal-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
    sha:a0e37ce8ed35f9433459f7e93ff16cc1f881df91
  • curl-minimal-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
    sha:70b0a4d053fa4b152d1172b3c4f3eb6d72667b41
  • libcurl-devel-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
    sha:dcc8ae96ced2adff34b7a0dfad37fd43557f390e
  • libcurl-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
    sha:6681f4dc9319d856884523e834e3ec08206aff61
  • libcurl-devel-7.61.1-22.el8.tuxcare.els2.i686.rpm
    sha:39c12a185d250f6ce8030c63595f3bb59867633c
  • libcurl-7.61.1-22.el8.tuxcare.els2.i686.rpm
    sha:bf3550b109163849426c0401df51a91541d78f18
  • libcurl-minimal-7.61.1-22.el8.tuxcare.els2.i686.rpm
    sha:95703b9a681dcedc967ce1598ff72831986fd6b2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.