OESA-2021-1170

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1170
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2021-1170.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2021-1170
Upstream
Published
2021-05-06T11:02:52Z
Modified
2025-08-12T05:07:20.221610Z
Summary
curl security update
Details

cURL is a computer software project providing a library (libcurl) and command-line tool (curl) for transferring data using various protocols.

Security Fix(es):

curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.(CVE-2021-22890)

curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.(CVE-2021-22876)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / curl

Package

Name
curl
Purl
pkg:rpm/openEuler/curl&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.71.1-6.oe1

Ecosystem specific

{
    "aarch64": [
        "curl-7.71.1-6.oe1.aarch64.rpm",
        "curl-debugsource-7.71.1-6.oe1.aarch64.rpm",
        "curl-debuginfo-7.71.1-6.oe1.aarch64.rpm",
        "libcurl-devel-7.71.1-6.oe1.aarch64.rpm",
        "libcurl-7.71.1-6.oe1.aarch64.rpm"
    ],
    "src": [
        "curl-7.71.1-6.oe1.src.rpm"
    ],
    "noarch": [
        "curl-help-7.71.1-6.oe1.noarch.rpm"
    ],
    "x86_64": [
        "curl-debuginfo-7.71.1-6.oe1.x86_64.rpm",
        "libcurl-devel-7.71.1-6.oe1.x86_64.rpm",
        "curl-debugsource-7.71.1-6.oe1.x86_64.rpm",
        "libcurl-7.71.1-6.oe1.x86_64.rpm",
        "curl-7.71.1-6.oe1.x86_64.rpm"
    ]
}