OESA-2022-2039

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2039
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2022-2039.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2022-2039
Upstream
Published
2022-11-04T11:04:30Z
Modified
2025-08-12T05:14:01.605524Z
Summary
curl security update
Details

CURL is a computer software project providing a library (libcurl) and command-line tool (curl) for transferring data using various protocols.

Security Fix(es):

A vulnerability was found in curl. The issue occurs when doing HTTP(S) transfers, where curl might erroneously use the read callback (CURLOPT_READFUNCTION) to ask for data to send, even when the CURLOPT_POSTFIELDS option has been set if it previously used the same handle to issue a PUT request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent POST request.(CVE-2022-32221)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / curl

Package

Name
curl
Purl
pkg:rpm/openEuler/curl&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.71.1-19.oe1

Ecosystem specific

{
    "src": [
        "curl-7.71.1-19.oe1.src.rpm"
    ],
    "x86_64": [
        "curl-debuginfo-7.71.1-19.oe1.x86_64.rpm",
        "libcurl-devel-7.71.1-19.oe1.x86_64.rpm",
        "curl-7.71.1-19.oe1.x86_64.rpm",
        "curl-debugsource-7.71.1-19.oe1.x86_64.rpm",
        "libcurl-7.71.1-19.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "libcurl-devel-7.71.1-19.oe1.aarch64.rpm",
        "curl-debuginfo-7.71.1-19.oe1.aarch64.rpm",
        "libcurl-7.71.1-19.oe1.aarch64.rpm",
        "curl-debugsource-7.71.1-19.oe1.aarch64.rpm",
        "curl-7.71.1-19.oe1.aarch64.rpm"
    ],
    "noarch": [
        "curl-help-7.71.1-19.oe1.noarch.rpm"
    ]
}