Oracle Linux 6278 Published by

A curl security update has been released for Oracle Linux 8.



El-errata: ELSA-2022-5313 Moderate: Oracle Linux 8 curl security update


Oracle Linux Security Advisory ELSA-2022-5313

  http://linux.oracle.com/errata/ELSA-2022-5313.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
curl-7.61.1-22.el8_6.3.x86_64.rpm
libcurl-7.61.1-22.el8_6.3.i686.rpm
libcurl-7.61.1-22.el8_6.3.x86_64.rpm
libcurl-devel-7.61.1-22.el8_6.3.i686.rpm
libcurl-devel-7.61.1-22.el8_6.3.x86_64.rpm
libcurl-minimal-7.61.1-22.el8_6.3.i686.rpm
libcurl-minimal-7.61.1-22.el8_6.3.x86_64.rpm

aarch64:
curl-7.61.1-22.el8_6.3.aarch64.rpm
libcurl-7.61.1-22.el8_6.3.aarch64.rpm
libcurl-devel-7.61.1-22.el8_6.3.aarch64.rpm
libcurl-minimal-7.61.1-22.el8_6.3.aarch64.rpm

SRPMS:
  http://oss.oracle.com/ol8/SRPMS-updates/curl-7.61.1-22.el8_6.3.src.rpm

Related CVEs:

CVE-2022-22576
CVE-2022-27774
CVE-2022-27776
CVE-2022-27782



Description of changes:

[7.61.1-22.el8_6.3]
- fix too eager reuse of TLS and SSH connections (CVE-2022-27782)

[7.61.1-22.el8_6.2]
- fix invalid type in printf() argument detected by Coverity

[7.61.1-22.el8_6.1]
- fix credential leak on redirect (CVE-2022-27774)
- fix auth/cookie leak on redirect (CVE-2022-27776)
- fix OAUTH2 bearer bypass in connection re-use (CVE-2022-22576)

_______________________________________________