rhsa-2022_1354
Vulnerability from csaf_redhat
Published
2022-04-13 14:31
Modified
2024-09-16 06:36
Summary
Red Hat Security Advisory: rh-dotnet31-curl security update

Notes

Topic
An update for rh-dotnet31-curl is now available for .NET Core on Red Hat Enterprise Linux. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Security Fix(es): * curl: Leak of authentication credentials in URL via automatic Referer (CVE-2021-22876) * curl: Bad connection reuse due to flawed path name checks (CVE-2021-22924) * curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols (CVE-2021-22946) * curl: Server responses received before STARTTLS processed after TLS handshake (CVE-2021-22947) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for rh-dotnet31-curl is now available for .NET Core on Red Hat Enterprise Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": ".NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.\n\nSecurity Fix(es):\n\n* curl: Leak of authentication credentials in URL via automatic Referer (CVE-2021-22876)\n\n* curl: Bad connection reuse due to flawed path name checks (CVE-2021-22924)\n\n* curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols (CVE-2021-22946)\n\n* curl: Server responses received before STARTTLS processed after TLS handshake (CVE-2021-22947)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:1354",
        "url": "https://access.redhat.com/errata/RHSA-2022:1354"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1941964",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941964"
      },
      {
        "category": "external",
        "summary": "1981460",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981460"
      },
      {
        "category": "external",
        "summary": "2003175",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003175"
      },
      {
        "category": "external",
        "summary": "2003191",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003191"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_1354.json"
      }
    ],
    "title": "Red Hat Security Advisory: rh-dotnet31-curl security update",
    "tracking": {
      "current_release_date": "2024-09-16T06:36:11+00:00",
      "generator": {
        "date": "2024-09-16T06:36:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "3.33.3"
        }
      },
      "id": "RHSA-2022:1354",
      "initial_release_date": "2022-04-13T14:31:31+00:00",
      "revision_history": [
        {
          "date": "2022-04-13T14:31:31+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-04-13T14:31:32+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-09-16T06:36:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)",
                "product": {
                  "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)",
                  "product_id": "7ComputeNode-dotNET-3.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_dotnet:3.1::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-dotNET-3.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_dotnet:3.1::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-dotNET-3.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_dotnet:3.1::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": ".NET Core on Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
                "product": {
                  "name": "rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
                  "product_id": "rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-dotnet31-curl@7.61.1-22.el7_9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
                "product": {
                  "name": "rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
                  "product_id": "rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-dotnet31-curl@7.61.1-22.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
                "product": {
                  "name": "rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
                  "product_id": "rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-dotnet31-libcurl@7.61.1-22.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
                "product": {
                  "name": "rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
                  "product_id": "rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-dotnet31-libcurl-devel@7.61.1-22.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
                "product": {
                  "name": "rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
                  "product_id": "rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-dotnet31-curl-debuginfo@7.61.1-22.el7_9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-curl-0:7.61.1-22.el7_9.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src"
        },
        "product_reference": "rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
        "relates_to_product_reference": "7ComputeNode-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64"
        },
        "product_reference": "rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64"
        },
        "product_reference": "rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64"
        },
        "product_reference": "rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
        },
        "product_reference": "rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-curl-0:7.61.1-22.el7_9.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src"
        },
        "product_reference": "rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
        "relates_to_product_reference": "7Server-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64"
        },
        "product_reference": "rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
        "relates_to_product_reference": "7Server-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64"
        },
        "product_reference": "rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
        "relates_to_product_reference": "7Server-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64"
        },
        "product_reference": "rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
        "relates_to_product_reference": "7Server-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
        },
        "product_reference": "rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
        "relates_to_product_reference": "7Server-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-curl-0:7.61.1-22.el7_9.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src"
        },
        "product_reference": "rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
        "relates_to_product_reference": "7Workstation-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64"
        },
        "product_reference": "rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64"
        },
        "product_reference": "rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64"
        },
        "product_reference": "rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-dotNET-3.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
        },
        "product_reference": "rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-dotNET-3.1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "the Curl project"
          ]
        },
        {
          "names": [
            "Viktor Szakats"
          ],
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2021-22876",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2021-03-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1941964"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that libcurl did not remove authentication credentials from URLs when automatically populating the Referer HTTP request header while handling HTTP redirects. This could lead to exposure of the credentials to the server to which requests were redirected.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "curl: Leak of authentication credentials in URL via automatic Referer",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
          "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
          "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22876"
        },
        {
          "category": "external",
          "summary": "RHBZ#1941964",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941964"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22876",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22876",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22876"
        }
      ],
      "release_date": "2021-03-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:1354"
        },
        {
          "category": "workaround",
          "details": "This issue can be avoided by using at least one of the following recommendations:\n\n* Do not enable automatic generation of Referer headers when redirects are followed. This functionality is not enabled by default.  In the curl command line tool, it is enabled using the -e \u0027;auto\u0027 or --referer \u0027;auto\u0027 command line options. In the libcurl library, it is enabled using the CURLOPT_AUTOREFERER option.\n\n* Do not include authentication credentials in URLs (in the form of https://username:password@example.com), use other methods to provide authentication credentials to curl / libcurl. For the curl command line tool, use -u or --user command line option. For the libcurl library, use CURLOPT_USERPWD or CURLOPT_USERNAME / CURLOPT_PASSWORD options.",
          "product_ids": [
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "curl: Leak of authentication credentials in URL via automatic Referer"
    },
    {
      "cve": "CVE-2021-22924",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "discovery_date": "2021-07-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1981460"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libcurl in the way libcurl handles previously used connections without accounting for \u0027issuer cert\u0027 and comparing the involved paths case-insensitively. This flaw allows libcurl to use the wrong connection. The highest threat from this vulnerability is to confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "curl: Bad connection reuse due to flawed path name checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
          "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
          "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22924"
        },
        {
          "category": "external",
          "summary": "RHBZ#1981460",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981460"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22924",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22924",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22924"
        },
        {
          "category": "external",
          "summary": "https://curl.se/docs/CVE-2021-22924.html",
          "url": "https://curl.se/docs/CVE-2021-22924.html"
        }
      ],
      "release_date": "2021-07-21T06:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:1354"
        },
        {
          "category": "workaround",
          "details": "This flaw can be mitigated by upgrading the affected curl utility to version 7.78.0",
          "product_ids": [
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "curl: Bad connection reuse due to flawed path name checks"
    },
    {
      "cve": "CVE-2021-22946",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "discovery_date": "2021-09-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2003175"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in curl. This flaw lies in the --ssl-reqd option or related settings in libcurl. Users specify this flag to upgrade to TLS when communicating with either IMAP, POP3 or a FTP server. An attacker controlling such servers could return a crafted response which could lead to curl client continue its operation without TLS encryption leading to data being transmitted in clear text over the network. The highest threat from this vulnerability is to data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
          "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
          "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22946"
        },
        {
          "category": "external",
          "summary": "RHBZ#2003175",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003175"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22946",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22946",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22946"
        },
        {
          "category": "external",
          "summary": "https://curl.se/docs/CVE-2021-22946.html",
          "url": "https://curl.se/docs/CVE-2021-22946.html"
        }
      ],
      "release_date": "2021-09-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:1354"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols"
    },
    {
      "cve": "CVE-2021-22947",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "discovery_date": "2021-09-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2003191"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in curl. The flaw lies in how curl handles cached or pipelined responses that it receives from either a IMAP, POP3, SMTP or FTP server before the TLS upgrade using STARTTLS. In such a scenario curl even after upgrading to TLS would trust these cached responses treating them as valid and authenticated and use them. An attacker could potentially use this flaw to carry out a Man-In-The-Middle attack. The highest threat from this vulnerability is to data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "curl: Server responses received before STARTTLS processed after TLS handshake",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
          "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
          "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
          "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
          "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
          "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22947"
        },
        {
          "category": "external",
          "summary": "RHBZ#2003191",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003191"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22947",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22947",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22947"
        },
        {
          "category": "external",
          "summary": "https://curl.se/docs/CVE-2021-22947.html",
          "url": "https://curl.se/docs/CVE-2021-22947.html"
        }
      ],
      "release_date": "2021-09-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:1354"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7ComputeNode-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Server-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Server-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.src",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-curl-debuginfo-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-0:7.61.1-22.el7_9.x86_64",
            "7Workstation-dotNET-3.1:rh-dotnet31-libcurl-devel-0:7.61.1-22.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "curl: Server responses received before STARTTLS processed after TLS handshake"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...