QID 354115

Date Published: 2022-12-08

QID 354115: Amazon Linux Security Advisory for curl : ALAS2-2022-1882

a vulnerability was found in curl.
The issue occurs when doing http(s) transfers, where curl might erroneously use the read callback (`curlopt_readfunction`) to ask for data to send, even when the `curlopt_postfields` option has been set if it previously used the same handle to issue a `put` request which used that callback.
This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `post` request. (
( CVE-2022-32221) a vulnerability was found in curl.
The issue occurs when curl is told to parse a `.netrc` file for credentials.
If that file ends in a line with consecutive non-white space letters and no newline, curl could read past the end of the stack-based buffer, and if the read works, it can write a zero byte beyond its boundary.
This issue, in most cases, causes a segfault or similar problem.
A denial of service can occur if a malicious user can provide a custom netrc file to an application or otherwise affect its contents. (
( CVE-2022-35260) a vulnerability was found in curl.
The issue occurs if curl is told to use an http proxy for a transfer with a non-http(s) url.
It sets up the connection to the remote server by issuing a `connect` request to the proxy and then tunnels the rest of the protocol through.
An http proxy might refuse this request (http proxies often only allow outgoing connections to specific port numbers, like 443 for https) and instead return a non-200 response code to the client.
` (cve-2022-42915) a vulnerability was found in curl.
The issue occurs because curls hsts check can be bypassed to trick it to keep using http.
`. (

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2022-1882 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354115

    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2022-1882 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2022-1882.html