Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2022-27782
HistoryJun 02, 2022 - 2:15 p.m.

CVE-2022-27782

2022-06-0214:15:44
Debian Security Bug Tracker
security-tracker.debian.org
57
libcurl
connection pool
tls
ssh
unix

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.002

Percentile

56.7%

libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.

OSVersionArchitecturePackageVersionFilename
Debian12allcurl<ย 7.83.1-1curl_7.83.1-1_all.deb
Debian11allcurl<ย 7.74.0-1.3+deb11u2curl_7.74.0-1.3+deb11u2_all.deb
Debian999allcurl<ย 7.83.1-1curl_7.83.1-1_all.deb
Debian13allcurl<ย 7.83.1-1curl_7.83.1-1_all.deb

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.002

Percentile

56.7%