3.5 Low
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:N/A:N
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
Low
0.007 Low
EPSS
Percentile
79.8%
Debian Security Advisory DSA-5330-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
January 27, 2023 https://www.debian.org/security/faq
Package : curl
CVE ID : CVE-2022-32221 CVE-2022-43552
Two vulnerabilities were discovered in Curl, an easy-to-use client-side
URL transfer library, which could result in denial of service or
information disclosure.
For the stable distribution (bullseye), these problems have been fixed in
version 7.74.0-1.3+deb11u5. This update also revises the fix for
CVE-2022-27774 released in DSA-5197-1.
We recommend that you upgrade your curl packages.
For the detailed security status of curl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/curl
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | arm64 | libcurl4 | < 7.64.0-4+deb10u4 | libcurl4_7.64.0-4+deb10u4_arm64.deb |
Debian | 10 | arm64 | libcurl4-nss-dev | < 7.64.0-4+deb10u4 | libcurl4-nss-dev_7.64.0-4+deb10u4_arm64.deb |
Debian | 11 | amd64 | libcurl4-nss-dev | < 7.74.0-1.3+deb11u5 | libcurl4-nss-dev_7.74.0-1.3+deb11u5_amd64.deb |
Debian | 11 | mips64el | libcurl4 | < 7.74.0-1.3+deb11u5 | libcurl4_7.74.0-1.3+deb11u5_mips64el.deb |
Debian | 11 | s390x | curl-dbgsym | < 7.74.0-1.3+deb11u5 | curl-dbgsym_7.74.0-1.3+deb11u5_s390x.deb |
Debian | 10 | arm64 | libcurl3-nss | < 7.64.0-4+deb10u4 | libcurl3-nss_7.64.0-4+deb10u4_arm64.deb |
Debian | 11 | i386 | libcurl3-nss-dbgsym | < 7.74.0-1.3+deb11u5 | libcurl3-nss-dbgsym_7.74.0-1.3+deb11u5_i386.deb |
Debian | 11 | armhf | libcurl4-openssl-dev | < 7.74.0-1.3+deb11u5 | libcurl4-openssl-dev_7.74.0-1.3+deb11u5_armhf.deb |
Debian | 10 | amd64 | libcurl3-nss | < 7.64.0-4+deb10u4 | libcurl3-nss_7.64.0-4+deb10u4_amd64.deb |
Debian | 11 | mips64el | libcurl3-gnutls | < 7.74.0-1.3+deb11u5 | libcurl3-gnutls_7.74.0-1.3+deb11u5_mips64el.deb |
3.5 Low
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:N/A:N
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
Low
0.007 Low
EPSS
Percentile
79.8%