Bug 2078388 (CVE-2022-27775)
Summary: | CVE-2022-27775 curl: bad local IPv6 connection reuse | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | andrew.slice, bodavis, csutherl, dbhole, drusek, erik-fedora, gzaronik, hhorak, jclere, jorton, jwon, kanderso, kdudka, luhliari, lvaleeva, mike, msekleta, mturk, omajid, paul, pjindal, rwagner, ryanhammerdick, security-response-team, svashisht, szappis |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | curl 7.83.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
A vulnerability was found in curl. This security flaw occurs due to errors in the logic where the config matching function did not take the IPv6 address zone id into account. This issue can lead to curl reusing the wrong connection when one transfer uses a zone id, and the subsequent transfer uses another.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-12-06 16:33:12 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2078743, 2079171, 2079172 | ||
Bug Blocks: | 2077543 |
Description
Marian Rehak
2022-04-25 08:00:42 UTC
Created curl tracking bugs for this issue: Affects: fedora-all [bug 2079171] Created mingw-curl tracking bugs for this issue: Affects: fedora-all [bug 2079172] This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:8299 https://access.redhat.com/errata/RHSA-2022:8299 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-27775 |