Errata ALT-PU-2020-3573-1: Information
Fixes
Published: Nov. 27, 2020
BDU:2021-03447
Уязвимость программного средства для взаимодействия с серверами CURL, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Severity: MEDIUM (5.3) Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Links:
Published: July 31, 2020
BDU:2021-03503
Уязвимость программного средства для взаимодействия с серверами CURL, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным
Severity: MEDIUM (5.3) Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Links:
Published: Nov. 21, 2020
BDU:2021-03504
Уязвимость программного средства для взаимодействия с серверами CURL, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
Severity: LOW (3.7) Vector: AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Links:
Published: Dec. 1, 2020
BDU:2021-03510
Уязвимость программного средства для взаимодействия с серверами CURL, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю оказать воздействие на целостность данных
Severity: MEDIUM (5.3) Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Links:
Published: Dec. 14, 2020
Modified: March 27, 2024
Modified: March 27, 2024
CVE-2020-8231
Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.
Severity: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Links:
- https://hackerone.com/reports/948876
- https://curl.haxx.se/docs/CVE-2020-8231.html
- GLSA-202012-14
- DSA-4881
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://www.oracle.com/security-alerts/cpuapr2022.html
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
Published: Dec. 14, 2020
Modified: April 9, 2024
Modified: April 9, 2024
CVE-2020-8284
A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
Severity: LOW (3.7) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Links:
- https://hackerone.com/reports/1040166
- https://curl.se/docs/CVE-2020-8284.html
- [debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update
- GLSA-202012-14
- https://security.netapp.com/advisory/ntap-20210122-0007/
- DSA-4881
- https://support.apple.com/kb/HT212325
- https://support.apple.com/kb/HT212326
- https://support.apple.com/kb/HT212327
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://www.oracle.com/security-alerts/cpuapr2022.html
- FEDORA-2020-ceaf490686
- FEDORA-2020-7ab62c73bc
Published: Dec. 14, 2020
Modified: March 27, 2024
Modified: March 27, 2024
CVE-2020-8285
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
Severity: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Links:
- https://curl.se/docs/CVE-2020-8285.html
- https://hackerone.com/reports/1045844
- https://github.com/curl/curl/issues/6255
- [debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update
- GLSA-202012-14
- https://security.netapp.com/advisory/ntap-20210122-0007/
- DSA-4881
- https://support.apple.com/kb/HT212325
- https://support.apple.com/kb/HT212326
- https://support.apple.com/kb/HT212327
- 20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://www.oracle.com/security-alerts/cpuapr2022.html
- FEDORA-2020-ceaf490686
- FEDORA-2020-7ab62c73bc
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
Published: Dec. 14, 2020
Modified: March 27, 2024
Modified: March 27, 2024
CVE-2020-8286
curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
Severity: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Links:
- https://hackerone.com/reports/1048457
- https://curl.se/docs/CVE-2020-8286.html
- [debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update
- GLSA-202012-14
- https://security.netapp.com/advisory/ntap-20210122-0007/
- DSA-4881
- https://support.apple.com/kb/HT212325
- https://support.apple.com/kb/HT212326
- https://support.apple.com/kb/HT212327
- 20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina
- 20210427 APPLE-SA-2021-04-26-4 Security Update 2021-003 Mojave
- 20210427 APPLE-SA-2021-04-26-2 macOS Big Sur 11.3
- https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://www.oracle.com/security-alerts/cpuapr2022.html
- FEDORA-2020-ceaf490686
- FEDORA-2020-7ab62c73bc