curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Haxx
Subscribe
|
Curl
Subscribe
|
|
Netapp
Subscribe
|
Cloud Backup
Subscribe
H300e
Subscribe
H300e Firmware
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500e
Subscribe
H500e Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700e
Subscribe
H700e Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
Hci Compute Node
Subscribe
Hci Compute Node Firmware
Subscribe
Solidfire\, Enterprise Sds \& Hci Storage Node
Subscribe
Solidfire \& Hci Management Node
Subscribe
Solidfire Baseboard Management Controller Firmware
Subscribe
|
|
Oracle
Subscribe
|
Communications Cloud Native Core Binding Support Function
Subscribe
Communications Cloud Native Core Network Function Cloud Native Environment
Subscribe
Communications Cloud Native Core Network Repository Function
Subscribe
Communications Cloud Native Core Network Slice Selection Function
Subscribe
Communications Cloud Native Core Service Communication Proxy
Subscribe
Essbase
Subscribe
Mysql Server
Subscribe
|
|
Siemens
Subscribe
|
Sinec Infrastructure Network Services
Subscribe
|
|
Splunk
Subscribe
|
Universal Forwarder
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-03T18:58:24.782Z
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-22897
No data.
Status : Modified
Published: 2021-06-11T16:15:10.963
Modified: 2024-11-21T05:50:51.927
Link: CVE-2021-22897
OpenCVE Enrichment
No data.