Description
When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3288-1 | curl security update |
Debian DSA |
DSA-5330-1 | curl security update |
Ubuntu USN |
USN-5702-1 | curl vulnerabilities |
Ubuntu USN |
USN-5702-2 | curl vulnerability |
Ubuntu USN |
USN-5823-1 | MySQL vulnerabilities |
References
History
Fri, 13 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Apple
Subscribe
Macos
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Haxx
Subscribe
Curl
Subscribe
Netapp
Subscribe
Clustered Data Ontap
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Rhel Eus
Subscribe
Splunk
Subscribe
Universal Forwarder
Subscribe
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2026-02-13T19:37:15.128Z
Reserved: 2022-06-01T00:00:00.000Z
Link: CVE-2022-32221
Updated: 2024-08-03T07:32:56.010Z
Status : Modified
Published: 2022-12-05T22:15:10.343
Modified: 2026-02-13T20:16:13.200
Link: CVE-2022-32221
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN