Name | CVE-2021-22898 |
Description | curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2734-1, DLA-3085-1, DSA-5197-1, ELA-470-1 |
Debian Bugs | 989228 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
curl (PTS) | jessie, jessie (lts) | 7.38.0-4+deb8u28 | fixed |
stretch (security) | 7.52.1-5+deb9u16 | fixed | |
stretch (lts), stretch | 7.52.1-5+deb9u22 | fixed | |
buster, buster (lts) | 7.64.0-4+deb10u10 | fixed | |
buster (security) | 7.64.0-4+deb10u9 | fixed | |
bullseye | 7.74.0-1.3+deb11u13 | fixed | |
bullseye (security) | 7.74.0-1.3+deb11u14 | fixed | |
bookworm | 7.88.1-10+deb12u8 | fixed | |
bookworm (security) | 7.88.1-10+deb12u5 | fixed | |
sid, trixie | 8.11.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
curl | source | jessie | 7.38.0-4+deb8u21 | ELA-470-1 | ||
curl | source | stretch | 7.52.1-5+deb9u15 | DLA-2734-1 | ||
curl | source | buster | 7.64.0-4+deb10u3 | DLA-3085-1 | ||
curl | source | bullseye | 7.74.0-1.3+deb11u2 | DSA-5197-1 | ||
curl | source | (unstable) | 7.79.1-1 | 989228 |
https://curl.se/docs/CVE-2021-22898.html
Introduced by: https://github.com/curl/curl/commit/a1d6ad26100bc493c7b04f1301b1634b7f5aa8b4 (7.7)
Fixed by: https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde (7.77.0)
Followup to not make curl vulnerable to CVE-2021-22925:
https://github.com/curl/curl/commit/894f6ec730597eb243618d33cc84d71add8d6a8a (curl-7_78_0)