First published: Wed Jun 01 2022(Updated: )
libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/curl | <=7.64.0-4+deb10u2 | 7.64.0-4+deb10u7 7.74.0-1.3+deb11u9 7.74.0-1.3+deb11u10 7.88.1-10+deb12u3 7.88.1-10+deb12u4 8.4.0-2 |
Haxx Curl | <7.83.1 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Splunk Universal Forwarder | >=8.2.0<8.2.12 | |
Splunk Universal Forwarder | >=9.0.0<9.0.6 | |
Splunk Universal Forwarder | =9.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27782 is a vulnerability in libcurl that allows the reuse of a previously created connection even when a TLS or SSH-related option had been changed that should have prohibited reuse.
The severity of CVE-2022-27782 is not stated in the provided information.
libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup.
Versions 7.64.0-4+deb10u6, 7.74.0-1.3+deb11u7, 7.88.1-10, 7.88.1-10+deb12u1, 7.88.1-11, and 8.2.1-1 of curl on Debian are affected by CVE-2022-27782.
Apply the recommended patches or updates provided by Debian for curl versions 7.64.0-4+deb10u6, 7.74.0-1.3+deb11u7, 7.88.1-10, 7.88.1-10+deb12u1, 7.88.1-11, and 8.2.1-1.