QID 354341

Date Published: 2022-12-21

QID 354341: Amazon Linux Security Advisory for curl : ALAS2022-2022-065

a vulnerability was found in curl.
This security flaw allows reusing oauth2-authenticated connections without properly ensuring that the connection was authenticated with the same credentials set for this transfer.
This issue leads to an authentication bypass, either by mistake or by a malicious actor. (
( CVE-2022-22576) a vulnerability was found in curl.
This security flaw allows leaking credentials to other servers when it follows redirects from auth-protected http(s) urls to other protocols and port numbers. (
( CVE-2022-27774) a vulnerability was found in curl.
This security flaw occurs due to errors in the logic where the config matching function did not take the ipv6 address zone id into account.
This issue can lead to curl reusing the wrong connection when one transfer uses a zone id, and the subsequent transfer uses another. (
( CVE-2022-27775) a vulnerability was found in curl.
This security flaw allows leak authentication or cookie header data on http redirects to the same host but another port number.
Sending the same set of headers to a server on a different port number is a problem for applications that pass on custom `authorization:` or `cookie:`headers.
Those headers often contain privacy-sensitive information or data. (
( CVE-2022-27776) a vulnerability was found in curl.
The issue occurs because curl wrongly allows http cookies to be set for top level domains (tlds) if the hostname is provided with a trailing dot.
This flaw allows arbitrary sites to set cookies that get sent to a different and unrelated site or domain by a malicious actor. (
( CVE-2022-27779) a vulnerability was found in curl.
( CVE-2022-27780) a vulnerability was found in curl.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.1 severity.
  • CVSS V2 rated as Medium - 5.5 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2022-2022-065 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2022-2022-065 amazon linux 2022 URL Logo alas.aws.amazon.com/AL2022/ALAS-2022-065.html