{"id":"CURL-CVE-2022-27782","summary":"TLS and SSH connection too eager reuse","details":"libcurl would reuse a previously created connection even when a TLS or SSH\nrelated option had been changed that should have prohibited reuse.\n\nlibcurl keeps previously used connections in a connection pool for subsequent\ntransfers to reuse if one of them matches the setup. However, several TLS and\nSSH settings were left out from the configuration match checks, making them\nmatch too easily.","aliases":["CVE-2022-27782"],"modified":"2026-04-25T20:38:43.749587Z","published":"2022-05-11T08:00:00Z","database_specific":{"www":"https://curl.se/docs/CVE-2022-27782.html","URL":"https://curl.se/docs/CVE-2022-27782.json","CWE":{"desc":"Authentication Bypass by Primary Weakness","id":"CWE-305"},"issue":"https://hackerone.com/reports/1555796","package":"curl","award":{"currency":"USD","amount":"2400"},"last_affected":"7.83.0","affects":"both","severity":"Medium"},"affected":[{"ranges":[{"type":"SEMVER","events":[{"introduced":"7.16.1"},{"fixed":"7.83.1"}]},{"type":"GIT","repo":"https://github.com/curl/curl.git","events":[{"introduced":"2147284cad624325f5b0034c2f394db62086d9e6"},{"fixed":"1645e9b44505abd5cbaf65da5282c3f33b5924a5"}]}],"versions":["7.83.0","7.82.0","7.81.0","7.80.0","7.79.1","7.79.0","7.78.0","7.77.0","7.76.1","7.76.0","7.75.0","7.74.0","7.73.0","7.72.0","7.71.1","7.71.0","7.70.0","7.69.1","7.69.0","7.68.0","7.67.0","7.66.0","7.65.3","7.65.2","7.65.1","7.65.0","7.64.1","7.64.0","7.63.0","7.62.0","7.61.1","7.61.0","7.60.0","7.59.0","7.58.0","7.57.0","7.56.1","7.56.0","7.55.1","7.55.0","7.54.1","7.54.0","7.53.1","7.53.0","7.52.1","7.52.0","7.51.0","7.50.3","7.50.2","7.50.1","7.50.0","7.49.1","7.49.0","7.48.0","7.47.1","7.47.0","7.46.0","7.45.0","7.44.0","7.43.0","7.42.1","7.42.0","7.41.0","7.40.0","7.39.0","7.38.0","7.37.1","7.37.0","7.36.0","7.35.0","7.34.0","7.33.0","7.32.0","7.31.0","7.30.0","7.29.0","7.28.1","7.28.0","7.27.0","7.26.0","7.25.0","7.24.0","7.23.1","7.23.0","7.22.0","7.21.7","7.21.6","7.21.5","7.21.4","7.21.3","7.21.2","7.21.1","7.21.0","7.20.1","7.20.0","7.19.7","7.19.6","7.19.5","7.19.4","7.19.3","7.19.2","7.19.1","7.19.0","7.18.2","7.18.1","7.18.0","7.17.1","7.17.0","7.16.4","7.16.3","7.16.2","7.16.1"],"database_specific":{"vanir_signatures":[{"deprecated":false,"signature_version":"v1","signature_type":"Function","target":{"file":"lib/url.c","function":"ConnectionExists"},"source":"https://github.com/curl/curl.git/commit/1645e9b44505abd5cbaf65da5282c3f33b5924a5","id":"CURL-CVE-2022-27782-7b2eabb4","digest":{"function_hash":"99092962748292928232394307787582302632","length":7817}},{"deprecated":false,"signature_version":"v1","signature_type":"Line","target":{"file":"lib/url.c"},"source":"https://github.com/curl/curl.git/commit/1645e9b44505abd5cbaf65da5282c3f33b5924a5","id":"CURL-CVE-2022-27782-8695d61c","digest":{"threshold":0.9,"line_hashes":["217266604513116286213413216511030227286","184910955677856886804220662644169493995","246521162139764462934664834810433006643","226987869706202606981489152973195276567","62548547928374615573250745368565343656","137348684572940159446635251058485146813"]}}],"vanir_signatures_modified":"2026-04-25T20:38:43Z","source":"https://curl.se/docs/CURL-CVE-2022-27782.json"}}],"schema_version":"1.7.5","credits":[{"name":"Harry Sintonen","type":"FINDER"},{"name":"Daniel Stenberg","type":"REMEDIATION_DEVELOPER"}]}