Bug 2078388 (CVE-2022-27775) - CVE-2022-27775 curl: bad local IPv6 connection reuse
Summary: CVE-2022-27775 curl: bad local IPv6 connection reuse
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-27775
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2078743 2079171 2079172
Blocks: 2077543
TreeView+ depends on / blocked
 
Reported: 2022-04-25 08:00 UTC by Marian Rehak
Modified: 2022-12-06 16:33 UTC (History)
26 users (show)

Fixed In Version: curl 7.83.0
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in curl. This security flaw occurs due to errors in the logic where the config matching function did not take the IPv6 address zone id into account. This issue can lead to curl reusing the wrong connection when one transfer uses a zone id, and the subsequent transfer uses another.
Clone Of:
Environment:
Last Closed: 2022-12-06 16:33:12 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:8299 0 None None None 2022-11-15 10:53:00 UTC

Description Marian Rehak 2022-04-25 08:00:42 UTC
Due to errors in the logic, the config matching function did not take the IPv6 address zone id into account which could lead to libcurl reusing wrong
connection when one transfer uses a zone id and subsequent transfer uses another.

Comment 3 Sandipan Roy 2022-04-27 06:36:02 UTC
https://curl.se/docs/CVE-2022-27775.html

Comment 4 Sandipan Roy 2022-04-27 06:37:34 UTC
Created curl tracking bugs for this issue:

Affects: fedora-all [bug 2079171]


Created mingw-curl tracking bugs for this issue:

Affects: fedora-all [bug 2079172]

Comment 6 errata-xmlrpc 2022-11-15 10:52:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:8299 https://access.redhat.com/errata/RHSA-2022:8299

Comment 7 Product Security DevOps Team 2022-12-06 16:33:09 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-27775


Note You need to log in before you can comment on or make changes to this bug.