curl-7.76.1-14.el9.4.ML.1

エラータID: AXSA:2022-4366:04

Release date: 
Friday, December 9, 2022 - 08:05
Subject: 
curl-7.76.1-14.el9.4.ML.1
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: OAUTH2 bearer bypass in connection re-use (CVE-2022-22576)
* curl: credential leak on redirect (CVE-2022-27774)
* curl: auth/cookie leak on redirect (CVE-2022-27776)
* curl: TLS and SSH connection too eager reuse (CVE-2022-27782)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2022-22576
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
CVE-2022-27774
An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.
CVE-2022-27776
A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.
CVE-2022-27782
libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. curl-7.76.1-14.el9.4.ML.1.src.rpm
    MD5: d350ea4971cfecb341423874e7ad62df
    SHA-256: 48547020b1617f1df106611e949cb91e6e30d52084871b5987978b634d28ee5f
    Size: 2.38 MB

Asianux Server 9 for x86_64
  1. curl-7.76.1-14.el9.4.ML.1.x86_64.rpm
    MD5: 9e56f16cd878c05f8310a24243681d6c
    SHA-256: 72ac5aa36ff7a79ec447da2077a65dbd9f6c55a0c12352caf20a31ae821857d5
    Size: 294.71 kB
  2. curl-minimal-7.76.1-14.el9.4.ML.1.x86_64.rpm
    MD5: 37441d73c318f09b63260ccf09580ba6
    SHA-256: 3aadf1fd7ad33ab36da9cf30fd91b0a7d2e6465c41fc06607f9f2b6e855451c5
    Size: 128.36 kB
  3. libcurl-7.76.1-14.el9.4.ML.1.x86_64.rpm
    MD5: 7710c9ef36e8f5ada61cab9397d46a5a
    SHA-256: cc7543a39c3ca948a6fa521880ec7fa7610e865c83c39a601d169f038387730b
    Size: 284.42 kB
  4. libcurl-devel-7.76.1-14.el9.4.ML.1.x86_64.rpm
    MD5: 2921bbe57dbaca8b1dcf0b25bda157f5
    SHA-256: bff261f4edb520bdaf6db500c578ba8eb81f2a58e598d4d6b1bf81c005f44575
    Size: 849.95 kB
  5. libcurl-minimal-7.76.1-14.el9.4.ML.1.x86_64.rpm
    MD5: 968b748ab5faf6623f5c4cef281be5b4
    SHA-256: 8c1171fe4c9819f5ca14f431e096c1ef79b0daab8cdd708e8492e887d460f93a
    Size: 225.73 kB
  6. libcurl-7.76.1-14.el9.4.ML.1.i686.rpm
    MD5: efcf3728c77d0aa21230be5edcd69b71
    SHA-256: 4dfabb9de90457508e83e86caeb276154523c3d913641a426cef2673223a0491
    Size: 310.71 kB
  7. libcurl-devel-7.76.1-14.el9.4.ML.1.i686.rpm
    MD5: b944ccbee77d9debdd5b42527dc36ce3
    SHA-256: 7c74ee158aa042494025bf657f5817f6c0f7496c38fa8b03449a25a38a89baae
    Size: 849.99 kB
  8. libcurl-minimal-7.76.1-14.el9.4.ML.1.i686.rpm
    MD5: c898e8949d7e1611db094184138dc612
    SHA-256: 98c7dd329b27ed1e120d251dc2a345914bc0f0aa6a2e2ee2175fa37af6cc2100
    Size: 246.04 kB