{"id":"MGASA-2022-0159","summary":"Updated curl packages fix security vulnerability","details":"OAUTH2 bearer bypass in connection re-use. (CVE-2022-22576)\nCredential leak on redirect. (CVE-2022-27774)\nBad local IPv6 connection reuse. (CVE-2022-27775)\nAuth/cookie leak on redirect. (CVE-2022-27776)\n","modified":"2026-01-31T16:50:27.256088Z","published":"2022-05-02T19:44:52Z","related":["CVE-2022-22576","CVE-2022-27774","CVE-2022-27775","CVE-2022-27776"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0159.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=30352"},{"type":"REPORT","url":"https://curl.se/docs/CVE-2022-22576.html"},{"type":"REPORT","url":"https://curl.se/docs/CVE-2022-27774.html"},{"type":"REPORT","url":"https://curl.se/docs/CVE-2022-27775.html"},{"type":"REPORT","url":"https://curl.se/docs/CVE-2022-27776.html"},{"type":"REPORT","url":"https://ubuntu.com/security/notices/USN-5397-1"}],"affected":[{"package":{"name":"curl","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/curl?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.74.0-1.5.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0159.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}