{"id":"CVE-2022-27782","details":"libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.","aliases":["CURL-CVE-2022-27782"],"modified":"2026-05-15T11:53:29.388435369Z","published":"2022-06-01T00:00:00Z","related":["ALSA-2022:5313","SUSE-SU-2022:1733-1","SUSE-SU-2022:1805-1","SUSE-SU-2022:1870-1","SUSE-SU-2022:2813-1","SUSE-SU-2022:2829-1","openSUSE-SU-2024:12062-1"],"database_specific":{"cwe_ids":["CWE-840"],"unresolved_ranges":[{"extracted_events":[{"last_affected":"Fixed in 7.83.1"}],"source":"AFFECTED_FIELD"}],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/27xxx/CVE-2022-27782.json","cna_assigner":"hackerone"},"references":[{"type":"WEB","url":"https://hackerone.com/reports/1555796"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/27xxx/CVE-2022-27782.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27782"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202212-01"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220609-0009/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5197"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2023/03/20/6"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}