![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2022-27782 |
Description: | libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.893288 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-27782 Debian Security Information: DSA-5197 (Google Search) https://www.debian.org/security/2022/dsa-5197 https://security.gentoo.org/glsa/202212-01 https://hackerone.com/reports/1555796 https://hackerone.com/reports/1555796 https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html http://www.openwall.com/lists/oss-security/2023/03/20/6 |