Lucene search

K
mageiaGentoo FoundationMGASA-2021-0186
HistoryApr 12, 2021 - 10:59 p.m.

Updated curl packages fix security vulnerabilities

2021-04-1222:59:59
Gentoo Foundation
advisories.mageia.org
42
curl
packages
security
vulnerabilities
libcurl
url
http
request
header
data
server
tls
session
ticket
proxy
host
mixup
cve-2021-22876
cve-2021-22890
unix

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.009

Percentile

83.0%

libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request. (CVE-2021-22876) TLS 1.3 session ticket proxy host mixup. (CVE-2021-22890)

OSVersionArchitecturePackageVersionFilename
Mageia7noarchcurl< 7.71.0-1.2curl-7.71.0-1.2.mga7
Mageia8noarchcurl< 7.74.0-1.1curl-7.74.0-1.1.mga8

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.009

Percentile

83.0%