ALAS2022-2022-065

Related Vulnerabilities: CVE-2022-22576   CVE-2022-27774   CVE-2022-27775   CVE-2022-27776   CVE-2022-27779   CVE-2022-27780   CVE-2022-27782   CVE-2022-30115  

A vulnerability was found in curl. This security flaw allows reusing OAUTH2-authenticated connections without properly ensuring that the connection was authenticated with the same credentials set for this transfer. This issue leads to an authentication bypass, either by mistake or by a malicious actor. (CVE-2022-22576) A vulnerability was found in curl. This security flaw allows leaking credentials to other servers when it follows redirects from auth-protected HTTP(S) URLs to other protocols and port numbers. (CVE-2022-27774) A vulnerability was found in curl. This security flaw occurs due to errors in the logic where the config matching function did not take the IPv6 address zone id into account. This issue can lead to curl reusing the wrong connection when one transfer uses a zone id, and the subsequent transfer uses another. (CVE-2022-27775) A vulnerability was found in curl. This security flaw allows leak authentication or cookie header data on HTTP redirects to the same host but another port number. Sending the same set of headers to a server on a different port number is a problem for applications that pass on custom `Authorization:` or `Cookie:`headers. Those headers often contain privacy-sensitive information or data. (CVE-2022-27776) A vulnerability was found in curl. The issue occurs because curl wrongly allows HTTP cookies to be set for Top Level Domains (TLDs) if the hostname is provided with a trailing dot. This flaw allows arbitrary sites to set cookies that get sent to a different and unrelated site or domain by a malicious actor. (CVE-2022-27779) A vulnerability was found in curl. This issue occurs because the curl URL parser wrongly accepts percent-encoded URL separators like / when decoding the hostname part of a URL, making it a different URL using the wrong hostname when it is later retrieved. This flaw allows a malicious actor to make circumventing filters. (CVE-2022-27780) A vulnerability was found in curl. This issue occurs because curl can reuse a previously created connection even when a TLS or SSH-related option is changed that should have prohibited reuse. This flaw leads to an authentication bypass, either by mistake or by a malicious actor. (CVE-2022-27782) A vulnerability was found in curl. This issue occurs because when using its HTTP Strict Transport Security(HSTS) support, it can instruct curl to use HTTPS directly instead of using an insecure clear text HTTP step even when HTTP is provided in the URL. This flaw leads to a clear text transmission of sensitive information. (CVE-2022-30115)

ALAS2022-2022-065


Amazon Linux 2022 Security Advisory: ALAS-2022-065
Advisory Release Date: 2022-05-18 13:32 Pacific
Advisory Updated Date: 2022-05-19 18:10 Pacific
Severity: Medium

Issue Overview:

A vulnerability was found in curl. This security flaw allows reusing OAUTH2-authenticated connections without properly ensuring that the connection was authenticated with the same credentials set for this transfer. This issue leads to an authentication bypass, either by mistake or by a malicious actor. (CVE-2022-22576)

A vulnerability was found in curl. This security flaw allows leaking credentials to other servers when it follows redirects from auth-protected HTTP(S) URLs to other protocols and port numbers. (CVE-2022-27774)

A vulnerability was found in curl. This security flaw occurs due to errors in the logic where the config matching function did not take the IPv6 address zone id into account. This issue can lead to curl reusing the wrong connection when one transfer uses a zone id, and the subsequent transfer uses another. (CVE-2022-27775)

A vulnerability was found in curl. This security flaw allows leak authentication or cookie header data on HTTP redirects to the same host but another port number. Sending the same set of headers to a server on a different port number is a problem for applications that pass on custom `Authorization:` or `Cookie:`headers. Those headers often contain privacy-sensitive information or data. (CVE-2022-27776)

A vulnerability was found in curl. The issue occurs because curl wrongly allows HTTP cookies to be set for Top Level Domains (TLDs) if the hostname is provided with a trailing dot. This flaw allows arbitrary sites to set cookies that get sent to a different and unrelated site or domain by a malicious actor. (CVE-2022-27779)

A vulnerability was found in curl. This issue occurs because the curl URL parser wrongly accepts percent-encoded URL separators like / when decoding the hostname part of a URL, making it a different URL using the wrong hostname when it is later retrieved. This flaw allows a malicious actor to make circumventing filters. (CVE-2022-27780)

A vulnerability was found in curl. This issue occurs because curl can reuse a previously created connection even when a TLS or SSH-related option is changed that should have prohibited reuse. This flaw leads to an authentication bypass, either by mistake or by a malicious actor. (CVE-2022-27782)

A vulnerability was found in curl. This issue occurs because when using its HTTP Strict Transport Security(HSTS) support, it can instruct curl to use HTTPS directly instead of using an insecure clear text HTTP step even when HTTP is provided in the URL. This flaw leads to a clear text transmission of sensitive information. (CVE-2022-30115)


Affected Packages:

curl


Issue Correction:
Run dnf update --releasever=2022.0.20220518 curl to update your system.

New Packages:
aarch64:
    libcurl-debuginfo-7.82.0-5.amzn2022.aarch64
    libcurl-minimal-debuginfo-7.82.0-5.amzn2022.aarch64
    curl-minimal-7.82.0-5.amzn2022.aarch64
    libcurl-7.82.0-5.amzn2022.aarch64
    curl-7.82.0-5.amzn2022.aarch64
    curl-debugsource-7.82.0-5.amzn2022.aarch64
    libcurl-minimal-7.82.0-5.amzn2022.aarch64
    curl-debuginfo-7.82.0-5.amzn2022.aarch64
    curl-minimal-debuginfo-7.82.0-5.amzn2022.aarch64
    libcurl-devel-7.82.0-5.amzn2022.aarch64

i686:
    libcurl-debuginfo-7.82.0-5.amzn2022.i686
    libcurl-minimal-debuginfo-7.82.0-5.amzn2022.i686
    curl-debugsource-7.82.0-5.amzn2022.i686
    libcurl-devel-7.82.0-5.amzn2022.i686
    libcurl-7.82.0-5.amzn2022.i686
    curl-7.82.0-5.amzn2022.i686
    curl-debuginfo-7.82.0-5.amzn2022.i686
    libcurl-minimal-7.82.0-5.amzn2022.i686
    curl-minimal-debuginfo-7.82.0-5.amzn2022.i686
    curl-minimal-7.82.0-5.amzn2022.i686

src:
    curl-7.82.0-5.amzn2022.src

x86_64:
    libcurl-minimal-debuginfo-7.82.0-5.amzn2022.x86_64
    libcurl-minimal-7.82.0-5.amzn2022.x86_64
    libcurl-debuginfo-7.82.0-5.amzn2022.x86_64
    curl-debuginfo-7.82.0-5.amzn2022.x86_64
    curl-7.82.0-5.amzn2022.x86_64
    curl-debugsource-7.82.0-5.amzn2022.x86_64
    libcurl-7.82.0-5.amzn2022.x86_64
    curl-minimal-debuginfo-7.82.0-5.amzn2022.x86_64
    curl-minimal-7.82.0-5.amzn2022.x86_64
    libcurl-devel-7.82.0-5.amzn2022.x86_64