Amazon Linux 2022 Security Advisory: ALAS-2022-065
Advisory Release Date: 2022-05-18 13:32 Pacific
Advisory Updated Date: 2022-05-19 18:10 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
A vulnerability was found in curl. This security flaw allows reusing OAUTH2-authenticated connections without properly ensuring that the connection was authenticated with the same credentials set for this transfer. This issue leads to an authentication bypass, either by mistake or by a malicious actor. (CVE-2022-22576)
A vulnerability was found in curl. This security flaw allows leaking credentials to other servers when it follows redirects from auth-protected HTTP(S) URLs to other protocols and port numbers. (CVE-2022-27774)
A vulnerability was found in curl. This security flaw occurs due to errors in the logic where the config matching function did not take the IPv6 address zone id into account. This issue can lead to curl reusing the wrong connection when one transfer uses a zone id, and the subsequent transfer uses another. (CVE-2022-27775)
A vulnerability was found in curl. This security flaw allows leak authentication or cookie header data on HTTP redirects to the same host but another port number. Sending the same set of headers to a server on a different port number is a problem for applications that pass on custom `Authorization:` or `Cookie:`headers. Those headers often contain privacy-sensitive information or data. (CVE-2022-27776)
A vulnerability was found in curl. The issue occurs because curl wrongly allows HTTP cookies to be set for Top Level Domains (TLDs) if the hostname is provided with a trailing dot. This flaw allows arbitrary sites to set cookies that get sent to a different and unrelated site or domain by a malicious actor. (CVE-2022-27779)
A vulnerability was found in curl. This issue occurs because the curl URL parser wrongly accepts percent-encoded URL separators like / when decoding the hostname part of a URL, making it a different URL using the wrong hostname when it is later retrieved. This flaw allows a malicious actor to make circumventing filters. (CVE-2022-27780)
A vulnerability was found in curl. This issue occurs because curl can reuse a previously created connection even when a TLS or SSH-related option is changed that should have prohibited reuse. This flaw leads to an authentication bypass, either by mistake or by a malicious actor. (CVE-2022-27782)
A vulnerability was found in curl. This issue occurs because when using its HTTP Strict Transport Security(HSTS) support, it can instruct curl to use HTTPS directly instead of using an insecure clear text HTTP step even when HTTP is provided in the URL. This flaw leads to a clear text transmission of sensitive information. (CVE-2022-30115)
Affected Packages:
curl
Issue Correction:
Run dnf update --releasever=2022.0.20220518 curl to update your system.
aarch64:
libcurl-debuginfo-7.82.0-5.amzn2022.aarch64
libcurl-minimal-debuginfo-7.82.0-5.amzn2022.aarch64
curl-minimal-7.82.0-5.amzn2022.aarch64
libcurl-7.82.0-5.amzn2022.aarch64
curl-7.82.0-5.amzn2022.aarch64
curl-debugsource-7.82.0-5.amzn2022.aarch64
libcurl-minimal-7.82.0-5.amzn2022.aarch64
curl-debuginfo-7.82.0-5.amzn2022.aarch64
curl-minimal-debuginfo-7.82.0-5.amzn2022.aarch64
libcurl-devel-7.82.0-5.amzn2022.aarch64
src:
curl-7.82.0-5.amzn2022.src
x86_64:
libcurl-minimal-debuginfo-7.82.0-5.amzn2022.x86_64
libcurl-minimal-7.82.0-5.amzn2022.x86_64
libcurl-debuginfo-7.82.0-5.amzn2022.x86_64
curl-debuginfo-7.82.0-5.amzn2022.x86_64
curl-7.82.0-5.amzn2022.x86_64
curl-debugsource-7.82.0-5.amzn2022.x86_64
libcurl-7.82.0-5.amzn2022.x86_64
curl-minimal-debuginfo-7.82.0-5.amzn2022.x86_64
curl-minimal-7.82.0-5.amzn2022.x86_64
libcurl-devel-7.82.0-5.amzn2022.x86_64