<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2023-0010</id>
    <title>An update for curl is now available for HCE 1.1</title>
    <severity>Important</severity>
    <release>HCE 1.1</release>
    <issued date="2023-01-05 02:56:00"/>
    <updated date="2023-01-05 02:56:00"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-8284" id="CVE-2020-8284" title="CVE-2020-8284 Base Score: 3.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-8231" id="CVE-2020-8231" title="CVE-2020-8231 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions. (CVE-2020-8284)

Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data. (CVE-2020-8231)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="curl">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="curl" version="7.29.0" release="59.hce1c.2">
          <filename>curl-7.29.0-59.hce1c.2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="libcurl" version="7.29.0" release="59.hce1c.2">
          <filename>libcurl-7.29.0-59.hce1c.2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="libcurl-devel" version="7.29.0" release="59.hce1c.2">
          <filename>libcurl-devel-7.29.0-59.hce1c.2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
