[CLSA-2022:1656430292] Fixed CVEs in curl: CVE-2022-27780, CVE-2022-27782, CVE-2022-27781
Type:
security
Severity:
Important
Release date:
2022-06-28
Description:
- CVE-2022-27782: check additional TLS or SSH connection parameters that should have prohibited connection reuse - CVE-2022-27781: add limit of certificates which can be traversed breaking possible infinite loop - CVE-2022-27780: exclude malicious characters from url to prevent incorrect address decoding
Updated packages:
  • curl-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
    sha:9f57aa0be76c93125666424f2aa544fbc3f2eb39
  • libcurl-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
    sha:02514a125a817d60353b855b14c2cbb66d634077
  • libcurl-devel-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
    sha:dd0b51aa89c8467164445f9c233648f33f5d9e75
  • libcurl-7.61.1-22.el8.tuxcare.els2.i686.rpm
    sha:4a7bea5818cbe0bfcdcb2588190169b012e65161
  • curl-minimal-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
    sha:87a4204ac04664c2df06960b583f4ec3a150e69a
  • libcurl-minimal-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
    sha:ffa10d8612db1e0010f835ea9353e4be0b847576
  • libcurl-devel-7.61.1-22.el8.tuxcare.els2.i686.rpm
    sha:3830958cde7538d1fc35d82b7ccec89b4c90cc28
  • libcurl-minimal-7.61.1-22.el8.tuxcare.els2.i686.rpm
    sha:0e34eefcd29db34bea4a5b7f052c6ffa0af42438
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.