OESA-2021-1321

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1321
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2021-1321.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2021-1321
Upstream
Published
2021-08-20T11:03:09Z
Modified
2025-08-12T05:07:24.759101Z
Summary
curl security update
Details

cURL is a computer software project providing a library (libcurl) and command-line tool (curl) for transferring data using various protocols.

Security Fix(es):

curl supports the -t command line option, known as CURLOPT_TELNETOPTIONSin libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending NEW_ENV variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.(CVE-2021-22925)

libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the CURLOPT_SSLCERT option (--cert with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like /tmp), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.(CVE-2021-22926)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / curl

Package

Name
curl
Purl
pkg:rpm/openEuler/curl&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.71.1-10.oe1

Ecosystem specific

{
    "aarch64": [
        "curl-debuginfo-7.71.1-10.oe1.aarch64.rpm",
        "libcurl-7.71.1-10.oe1.aarch64.rpm",
        "curl-7.71.1-10.oe1.aarch64.rpm",
        "curl-debugsource-7.71.1-10.oe1.aarch64.rpm",
        "libcurl-devel-7.71.1-10.oe1.aarch64.rpm"
    ],
    "noarch": [
        "curl-help-7.71.1-10.oe1.noarch.rpm"
    ],
    "src": [
        "curl-7.71.1-10.oe1.src.rpm"
    ],
    "x86_64": [
        "libcurl-devel-7.71.1-10.oe1.x86_64.rpm",
        "curl-7.71.1-10.oe1.x86_64.rpm",
        "curl-debuginfo-7.71.1-10.oe1.x86_64.rpm",
        "libcurl-7.71.1-10.oe1.x86_64.rpm",
        "curl-debugsource-7.71.1-10.oe1.x86_64.rpm"
    ]
}

openEuler:20.03-LTS-SP2 / curl

Package

Name
curl
Purl
pkg:rpm/openEuler/curl&distro=openEuler-20.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.71.1-10.oe1

Ecosystem specific

{
    "aarch64": [
        "curl-debugsource-7.71.1-10.oe1.aarch64.rpm",
        "libcurl-7.71.1-10.oe1.aarch64.rpm",
        "curl-debuginfo-7.71.1-10.oe1.aarch64.rpm",
        "libcurl-devel-7.71.1-10.oe1.aarch64.rpm",
        "curl-7.71.1-10.oe1.aarch64.rpm"
    ],
    "noarch": [
        "curl-help-7.71.1-10.oe1.noarch.rpm"
    ],
    "src": [
        "curl-7.71.1-10.oe1.src.rpm"
    ],
    "x86_64": [
        "curl-7.71.1-10.oe1.x86_64.rpm",
        "curl-debugsource-7.71.1-10.oe1.x86_64.rpm",
        "libcurl-devel-7.71.1-10.oe1.x86_64.rpm",
        "libcurl-7.71.1-10.oe1.x86_64.rpm",
        "curl-debuginfo-7.71.1-10.oe1.x86_64.rpm"
    ]
}