CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS
Percentile
80.5%
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
curl: FTP PASV command response can cause curl to connect to arbitrary host (CVE-2020-8284)
curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used (CVE-2020-8285)
curl: Inferior OCSP verification (CVE-2020-8286)
curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set (CVE-2020-8231)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
rocky | 8 | aarch64 | curl | < 7.61.1-18.el8 | curl-0:7.61.1-18.el8.aarch64.rpm |
rocky | 8 | x86_64 | curl | < 7.61.1-18.el8 | curl-0:7.61.1-18.el8.x86_64.rpm |
rocky | 8 | aarch64 | curl-debuginfo | < 7.61.1-18.el8 | curl-debuginfo-0:7.61.1-18.el8.aarch64.rpm |
rocky | 8 | i686 | curl-debuginfo | < 7.61.1-18.el8 | curl-debuginfo-0:7.61.1-18.el8.i686.rpm |
rocky | 8 | x86_64 | curl-debuginfo | < 7.61.1-18.el8 | curl-debuginfo-0:7.61.1-18.el8.x86_64.rpm |
rocky | 8 | aarch64 | curl-debugsource | < 7.61.1-18.el8 | curl-debugsource-0:7.61.1-18.el8.aarch64.rpm |
rocky | 8 | i686 | curl-debugsource | < 7.61.1-18.el8 | curl-debugsource-0:7.61.1-18.el8.i686.rpm |
rocky | 8 | x86_64 | curl-debugsource | < 7.61.1-18.el8 | curl-debugsource-0:7.61.1-18.el8.x86_64.rpm |
rocky | 8 | aarch64 | libcurl | < 7.61.1-18.el8 | libcurl-0:7.61.1-18.el8.aarch64.rpm |
rocky | 8 | i686 | libcurl | < 7.61.1-18.el8 | libcurl-0:7.61.1-18.el8.i686.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS
Percentile
80.5%