RLSA-2021:1610

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2021:1610.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2021:1610
Related
Published
2021-05-18T05:39:00Z
Modified
2023-02-02T14:09:18.983805Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Moderate: curl security and bug fix update
Details

The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

  • curl: FTP PASV command response can cause curl to connect to arbitrary host (CVE-2020-8284)

  • curl: Malicious FTP server can trigger stack overflow when CURLOPTCHUNKBGN_FUNCTION is used (CVE-2020-8285)

  • curl: Inferior OCSP verification (CVE-2020-8286)

  • curl: Expired pointer dereference via multi API with CURLOPTCONNECTONLY option set (CVE-2020-8231)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / curl

Package

Name
curl
Purl
pkg:rpm/rocky-linux/curl?distro=rocky-linux-8-4-legacy&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:7.61.1-18.el8