MGASA-2020-0482

Source
https://advisories.mageia.org/MGASA-2020-0482.html
Import Source
https://advisories.mageia.org/MGASA-2020-0482.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0482
Related
Published
2020-12-31T14:32:44Z
Modified
2020-12-31T13:54:38Z
Summary
Updated curl packages fix security vulnerabilities
Details

Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data. (CVE-2020-8231).

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions. (CVE-2020-8284).

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing. (CVE-2020-8285).

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. (CVE-2020-8286).

References
Credits

Affected packages

Mageia:7 / curl

Package

Name
curl
Purl
pkg:rpm/mageia/curl?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.71.0-1.1.mga7

Ecosystem specific

{
    "section": "core"
}