First published: Thu May 05 2022(Updated: )
libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-curl | <0:7.86.0-2.el8 | 0:7.86.0-2.el8 |
redhat/jbcs-httpd24-curl | <0:7.86.0-2.el7 | 0:7.86.0-2.el7 |
debian/curl | <=7.64.0-4+deb10u2 | 7.64.0-4+deb10u7 7.74.0-1.3+deb11u9 7.74.0-1.3+deb11u10 7.88.1-10+deb12u3 7.88.1-10+deb12u4 8.4.0-2 |
redhat/curl | <7.83.1 | 7.83.1 |
Curl | <7.83.1 | |
Debian Linux | =10.0 | |
Debian Linux | =11.0 | |
All of | ||
NetApp Bootstrap OS | ||
NetApp HCI Compute Node | ||
IBM Data ONTAP | ||
NetApp SolidFire Enterprise SDS | ||
NetApp SolidFire & HCI Management Node | ||
NetApp HCI Compute Node | ||
All of | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
All of | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H700S | ||
NetApp H700S | ||
All of | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
Splunk Universal Forwarder | >=8.2.0<8.2.12 | |
Splunk Universal Forwarder | >=9.0.0<9.0.6 | |
Splunk Universal Forwarder | =9.1.0 | |
NetApp Bootstrap OS | ||
NetApp HCI Compute Node | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
NetApp H700S | ||
NetApp H700S | ||
NetApp H410S | ||
NetApp H410S Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-27781.
The affected software includes curl, jbcs-httpd24-curl, Debian Linux, Haxx Curl, NetApp Clustered Data ONTAP, NetApp Solidfire, Enterprise SDS & HCI Storage Node, and NetApp Solidfire & HCI Management Node.
The severity of CVE-2022-27781 is high with a severity value of 7.5.
To fix this vulnerability in Red Hat systems, update the curl package to version 7.83.1 or higher.
You can find more information about CVE-2022-27781 on the Red Hat Bugzilla and Red Hat Advisory pages.