{"id":"MGASA-2020-0482","summary":"Updated curl packages fix security vulnerabilities","details":"Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the\nwrong connection when sending data. (CVE-2020-8231).\n\nA malicious server can use the FTP PASV response to trick curl 7.73.0 and\nearlier into connecting back to a given IP address and port, and this way\npotentially make curl extract information about services that are otherwise\nprivate and not disclosed, for example doing port scanning and service banner\nextractions. (CVE-2020-8284).\n\ncurl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion\ndue to a stack overflow issue in FTP wildcard match parsing. (CVE-2020-8285).\n\ncurl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate\nrevocation due to insufficient verification of the OCSP response.\n(CVE-2020-8286).\n","modified":"2026-04-16T00:09:06.130468053Z","published":"2020-12-31T14:32:44Z","upstream":["CVE-2020-8231","CVE-2020-8284","CVE-2020-8285","CVE-2020-8286"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0482.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=27154"},{"type":"ADVISORY","url":"https://curl.haxx.se/docs/CVE-2020-8231.html"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4466-1"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/Q7JHSXTQ7EUHJPYL333CB3OBCKHA5FQC/"},{"type":"ADVISORY","url":"https://curl.se/docs/CVE-2020-8284.html"},{"type":"ADVISORY","url":"https://curl.se/docs/CVE-2020-8285.html"},{"type":"ADVISORY","url":"https://curl.se/docs/CVE-2020-8286.html"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4665-1"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/"}],"affected":[{"package":{"name":"curl","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/curl?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.71.0-1.1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0482.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}