Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2021:1610: Red Hat Security Advisory: curl security and bug fix update

An update for curl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es):

  • curl: FTP PASV command response can cause curl to connect to arbitrary host (CVE-2020-8284)
  • curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used (CVE-2020-8285)
  • curl: Inferior OCSP verification (CVE-2020-8286)
  • curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set (CVE-2020-8231) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section. Related CVEs:
  • CVE-2020-8231: curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set
  • CVE-2020-8284: curl: FTP PASV command response can cause curl to connect to arbitrary host
  • CVE-2020-8285: curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used
  • CVE-2020-8286: curl: Inferior OCSP verification
Red Hat Security Data
#vulnerability#linux#red_hat

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update