{"id":"MGASA-2022-0483","summary":"Updated curl packages fix security vulnerability","details":"Another HSTS bypass via IDN. (CVE-2022-43551)\nHTTP Proxy deny use-after-free. (CVE-2022-43552)\n","modified":"2026-04-16T04:44:06.929671935Z","published":"2022-12-30T22:39:00Z","upstream":["CVE-2022-43551","CVE-2022-43552"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0483.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=31306"},{"type":"ADVISORY","url":"https://curl.se/docs/CVE-2022-43551.html"},{"type":"ADVISORY","url":"https://curl.se/docs/CVE-2022-43552.html"},{"type":"WEB","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQ4FFB6OHYJ2NLJSNA767MNOKSZ3XGF2/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/"}],"affected":[{"package":{"name":"curl","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/curl?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.74.0-1.10.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0483.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}