Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.13.2020.344.01
Category:Slackware Local Security Checks
Title:Slackware: Security Advisory (SSA:2020-344-01)
Summary:The remote host is missing an update for the 'curl' package(s) announced via the SSA:2020-344-01 advisory.
Description:Summary:
The remote host is missing an update for the 'curl' package(s) announced via the SSA:2020-344-01 advisory.

Vulnerability Insight:
New curl packages are available for Slackware 14.0, 14.1, 14.2, and -current to
fix security issues.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/curl-7.74.0-i586-1_slack14.2.txz: Upgraded.
This release includes the following security related bugfixes:
Inferior OCSP verification [93]
FTP wildcard stack overflow [95]
Trusting FTP PASV responses [97]
For more information, see:
[links moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'curl' package(s) on Slackware 14.0, Slackware 14.1, Slackware 14.2, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-8284
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
Debian Security Information: DSA-4881 (Google Search)
https://www.debian.org/security/2021/dsa-4881
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://security.gentoo.org/glsa/202012-14
https://curl.se/docs/CVE-2020-8284.html
https://hackerone.com/reports/1040166
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-8285
http://seclists.org/fulldisclosure/2021/Apr/51
https://curl.se/docs/CVE-2020-8285.html
https://github.com/curl/curl/issues/6255
https://hackerone.com/reports/1045844
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
Common Vulnerability Exposure (CVE) ID: CVE-2020-8286
https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf
http://seclists.org/fulldisclosure/2021/Apr/50
http://seclists.org/fulldisclosure/2021/Apr/54
https://curl.se/docs/CVE-2020-8286.html
https://hackerone.com/reports/1048457
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.