When curl does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
Created curl tracking bugs for this issue: Affects: fedora-all [bug 2101654] Created mingw-curl tracking bugs for this issue: Affects: fedora-all [bug 2101655]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:6157 https://access.redhat.com/errata/RHSA-2022:6157
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:6159 https://access.redhat.com/errata/RHSA-2022:6159
This issue has been addressed in the following products: JBoss Core Services on RHEL 7 JBoss Core Services for RHEL 8 Via RHSA-2022:8840 https://access.redhat.com/errata/RHSA-2022:8840
This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2022:8841 https://access.redhat.com/errata/RHSA-2022:8841
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-32208