Lucene search

K
rosalinuxROSA LABROSA-SA-2023-2221
HistoryAug 22, 2023 - 1:21 p.m.

Advisory ROSA-SA-2023-2221

2023-08-2213:21:47
ROSA LAB
abf.rosalinux.ru
8

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

58.6%

Software: curl 7.61.1
OS: ROSA Virtualization 2.1

package_evr_string: curl-7.61.1-30.rv3.2c.src.rpm

CVE-ID: CVE-2022-32206
BDU-ID: 2022-06918
CVE-Crit: MEDIUM
CVE-DESC.: A vulnerability in the CURL server communication software tool is related to the allocation of unlimited memory. Exploitation of the vulnerability allows an attacker acting remotely to cause a denial of service
CVE-STATUS: Resolved
CVE-REV: To close, run the yum update curl command

CVE-ID: CVE-2022-43552
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: Usage after a free vulnerability exists in curl <7.87.0. Curl can be asked to “tunnel” almost all protocols it supports through HTTP proxies. HTTP proxies can (and often do) block such tunneling operations. Having been denied tunneling certain SMB or TELNET protocols, curl will use the structure allocated in the heap, once released, in its transmission termination code path.
CVE-STATUS: Fixed
CVE-REV: To close, run the yum update curl command

CVE-ID: CVE-2023-23916
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: Unconstrained resource allocation or regulatory vulnerability exists in curl

OSVersionArchitecturePackageVersionFilename
ROSAanynoarchcurl< 7.61.1UNKNOWN

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

58.6%