Pop-Up Thingie

>>> Magnum BBS <<<
  • Home
  • Forum
  • Files
  • Log in

  1. Forum
  2. Usenet
  3. LINUX.GENTOO.ANNOUNCE
  • [gentoo-announce] [ GLSA 202212-01 ] curl: Multiple Vulnerabilities

    From glsamaker@gentoo.org@21:1/5 to All on Mon Dec 19 03:20:01 2022
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202212-01
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: curl: Multiple Vulnerabilities
    Date: December 19, 2022
    Bugs: #803308, #813270, #841302, #843824, #854708, #867679, #878365
    ID: 202212-01

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been found in curl, the worst of which
    could result in arbitrary code execution.

    Background
    ==========

    A command line tool and library for transferring data with URLs.

    Affected packages
    =================

    -------------------------------------------------------------------
    Package / Vulnerable / Unaffected
    -------------------------------------------------------------------
    1 net-misc/curl < 7.86.0 >= 7.86.0

    Description
    ===========

    Multiple vulnerabilities have been discovered in curl. Please review the
    CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All curl users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-misc/curl-7.86.0"

    References
    ==========

    [ 1 ] CVE-2021-22922
    https://nvd.nist.gov/vuln/detail/CVE-2021-22922
    [ 2 ] CVE-2021-22923
    https://nvd.nist.gov/vuln/detail/CVE-2021-22923
    [ 3 ] CVE-2021-22925
    https://nvd.nist.gov/vuln/detail/CVE-2021-22925
    [ 4 ] CVE-2021-22926
    https://nvd.nist.gov/vuln/detail/CVE-2021-22926
    [ 5 ] CVE-2021-22945
    https://nvd.nist.gov/vuln/detail/CVE-2021-22945
    [ 6 ] CVE-2021-22946
    https://nvd.nist.gov/vuln/detail/CVE-2021-22946
    [ 7 ] CVE-2021-22947
    https://nvd.nist.gov/vuln/detail/CVE-2021-22947
    [ 8 ] CVE-2022-22576
    https://nvd.nist.gov/vuln/detail/CVE-2022-22576
    [ 9 ] CVE-2022-27774
    https://nvd.nist.gov/vuln/detail/CVE-2022-27774
    [ 10 ] CVE-2022-27775
    https://nvd.nist.gov/vuln/detail/CVE-2022-27775
    [ 11 ] CVE-2022-27776
    https://nvd.nist.gov/vuln/detail/CVE-2022-27776
    [ 12 ] CVE-2022-27779
    https://nvd.nist.gov/vuln/detail/CVE-2022-27779
    [ 13 ] CVE-2022-27780
    https://nvd.nist.gov/vuln/detail/CVE-2022-27780
    [ 14 ] CVE-2022-27781
    https://nvd.nist.gov/vuln/detail/CVE-2022-27781
    [ 15 ] CVE-2022-27782
    https://nvd.nist.gov/vuln/detail/CVE-2022-27782
    [ 16 ] CVE-2022-30115
    https://nvd.nist.gov/vuln/detail/CVE-2022-30115
    [ 17 ] CVE-2022-32205
    https://nvd.nist.gov/vuln/detail/CVE-2022-32205
    [ 18 ] CVE-2022-32206
    https://nvd.nist.gov/vuln/detail/CVE-2022-32206
    [ 19 ] CVE-2022-32207
    https://nvd.nist.gov/vuln/detail/CVE-2022-32207
    [ 20 ] CVE-2022-32208
    https://nvd.nist.gov/vuln/detail/CVE-2022-32208
    [ 21 ] CVE-2022-32221
    https://nvd.nist.gov/vuln/detail/CVE-2022-32221
    [ 22 ] CVE-2022-35252
    https://nvd.nist.gov/vuln/detail/CVE-2022-35252
    [ 23 ] CVE-2022-35260
    https://nvd.nist.gov/vuln/detail/CVE-2022-35260
    [ 24 ] CVE-2022-42915
    https://nvd.nist.gov/vuln/detail/CVE-2022-42915
    [ 25 ] CVE-2022-42916
    https://nvd.nist.gov/vuln/detail/CVE-2022-42916

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202212-01

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2022 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmOfxZQACgkQFMQkOaVy +9kIWBAAzdTx8bZpGVYLjA27gSwunaE3SLUmjhXp3ONTk7gSH/cjNjGjKaA+0DmS udMHIpxSUOMU+mpfhyDgbP6z8TVf3+rMV15wGPCxAr42mJqoQOVzzCGK61/t642H XhK0oQKbjRtb3TtIH6k3ZuU08jsN6J/k1CLJI6qRxPf4ZJ0AgFJEzSBhtrJTLV8q eJ0QcbRvuJ4P5y47lVxyOZu8Mo0Iz6D3Qoqa0hWc+iEVSdrzbCLoDspVHBOvqBJE EjKkFfN4mmn1afLwxbfHhHhhFjgpC5YecxH4NGm473FNL8AI+9cMv7WFYTyDeqO+ QVHqiKCfmU0023tpi3K9v3AfLkl87lnJjHwwSGDKSWtZrusawuglPltVQjyw+naF wSkJt1Y+MJi9ESrDvrjv9U3LTgFMy3p7f2Pbi43sYwBye3tqdJYaVqcwiHT/JPA4 2CPUTBt7rseWvQSxlNS+b9ynkqCe34QBKFGiC10XPNtHx4WDLiW2pIfh+oumnWoI Gmtje3ze/Kj3iH2LHPNcZnrOujvUcgQjfRlfc0eK7/2roSEOFAYY3rAX5rUj7A8Y OyfvB45MW0FvoPlofJLoqhA0u/+OW0e7VjU9CBg+rYGuf/uj3aNz+78T8hNsyQ7C Jpk2G5hewW65hekWw3a72g9NE8Mu8FpEqDMbjbZkK1R2XddrZM8=
    =C6MP
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • Who's Online

  • Recent Visitors

    • Thlc
      Sat Sep 13 17:11:34 2025
      from Rognac, France via Telnet
    • Thlc
      Sat Sep 13 17:04:03 2025
      from Rognac, France via Telnet
    • Thlc
      Sat Sep 13 16:32:19 2025
      from Rognac, France via SSH
    • Thlc
      Sat Sep 13 15:41:11 2025
      from Rognac, France via SSH
    • Thlc
      Sat Sep 13 07:56:03 2025
      from Rognac, France via SSH
    • Gretchiie
      Sat Sep 13 07:22:10 2025
      from Derry, Nh via Telnet
    • Thlc
      Sat Sep 13 06:57:56 2025
      from Rognac, France via SSH
    • Thlc
      Sat Sep 13 06:47:28 2025
      from Rognac, France via SSH
  • System Info

    Sysop: Keyop
    Location: Huddersfield, West Yorkshire, UK
    Users: 546
    Nodes: 16 (2 / 14)
    Uptime: 146:25:21
    Calls: 10,383
    Calls today: 8
    Files: 14,054
    D/L today: 2 files
    (1,861K bytes)
    Messages: 6,417,708

© >>> Magnum BBS <<<, 2025