First published: Thu May 05 2022(Updated: )
libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-curl | <0:7.86.0-2.el8 | 0:7.86.0-2.el8 |
redhat/jbcs-httpd24-curl | <0:7.86.0-2.el7 | 0:7.86.0-2.el7 |
debian/curl | <=7.64.0-4+deb10u2 | 7.64.0-4+deb10u7 7.74.0-1.3+deb11u9 7.74.0-1.3+deb11u10 7.88.1-10+deb12u3 7.88.1-10+deb12u4 8.4.0-2 |
redhat/curl | <7.83.1 | 7.83.1 |
Curl | <7.83.1 | |
Debian | =10.0 | |
Debian | =11.0 | |
All of | ||
netapp hci bootstrap os | ||
netapp hci compute node | ||
IBM Data ONTAP | ||
netapp solidfire\, enterprise sds \& hci storage node | ||
netapp solidfire \& hci management node | ||
netapp hci compute node | ||
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
Splunk Universal Forwarder | >=8.2.0<8.2.12 | |
Splunk Universal Forwarder | >=9.0.0<9.0.6 | |
Splunk Universal Forwarder | =9.1.0 | |
netapp hci bootstrap os | ||
netapp hci compute node | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h410s firmware | ||
netapp h410s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-27781.
The affected software includes curl, jbcs-httpd24-curl, Debian Linux, Haxx Curl, NetApp Clustered Data ONTAP, NetApp Solidfire, Enterprise SDS & HCI Storage Node, and NetApp Solidfire & HCI Management Node.
The severity of CVE-2022-27781 is high with a severity value of 7.5.
To fix this vulnerability in Red Hat systems, update the curl package to version 7.83.1 or higher.
You can find more information about CVE-2022-27781 on the Red Hat Bugzilla and Red Hat Advisory pages.