Description
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2734-1 | curl security update |
Debian DLA |
DLA-3085-1 | curl security update |
Debian DSA |
DSA-5197-1 | curl security update |
Ubuntu USN |
USN-5021-1 | curl vulnerabilities |
Ubuntu USN |
USN-5021-2 | curl vulnerability |
Ubuntu USN |
USN-5894-1 | curl vulnerabilities |
References
History
No history.
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Haxx
Subscribe
Curl
Subscribe
Oracle
Subscribe
Communications Cloud Native Core Binding Support Function
Subscribe
Communications Cloud Native Core Network Function Cloud Native Environment
Subscribe
Communications Cloud Native Core Network Repository Function
Subscribe
Communications Cloud Native Core Network Slice Selection Function
Subscribe
Communications Cloud Native Core Service Communication Proxy
Subscribe
Essbase
Subscribe
Mysql Server
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Siemens
Subscribe
Sinec Infrastructure Network Services
Subscribe
Splunk
Subscribe
Universal Forwarder
Subscribe
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-03T18:58:25.359Z
Reserved: 2021-01-06T00:00:00.000Z
Link: CVE-2021-22898
No data.
Status : Modified
Published: 2021-06-11T16:15:11.043
Modified: 2024-11-21T05:50:52.103
Link: CVE-2021-22898
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN