Search for packages
Package details: pkg:alpm/archlinux/curl@7.76.1-1
purl pkg:alpm/archlinux/curl@7.76.1-1
Next non-vulnerable version 7.79.0-1
Latest non-vulnerable version 8.14.1-1
Risk 4.0
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-2zq2-qsgf-aaaj
Aliases:
CVE-2021-22898
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
7.77.0-1
Affected by 4 other vulnerabilities.
VCID-ngzd-mupw-aaas
Aliases:
CVE-2021-22897
curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.
7.77.0-1
Affected by 4 other vulnerabilities.
VCID-tz5z-xncu-aaaf
Aliases:
CVE-2021-22901
curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.
7.77.0-1
Affected by 4 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-03-28T07:47:04.006987+00:00 Arch Linux Importer Affected by VCID-ngzd-mupw-aaas https://security.archlinux.org/AVG-2016 36.0.0
2025-03-28T07:45:36.690359+00:00 Arch Linux Importer Affected by VCID-2zq2-qsgf-aaaj https://security.archlinux.org/AVG-1995 36.0.0
2025-03-28T07:45:36.671174+00:00 Arch Linux Importer Affected by VCID-tz5z-xncu-aaaf https://security.archlinux.org/AVG-1995 36.0.0
2024-10-20T17:34:01.288809+00:00 Arch Linux Importer Affected by VCID-2zq2-qsgf-aaaj https://security.archlinux.org/AVG-1995 34.0.2
2024-10-20T17:34:01.262171+00:00 Arch Linux Importer Affected by VCID-tz5z-xncu-aaaf https://security.archlinux.org/AVG-1995 34.0.2
2024-09-18T02:02:27.144204+00:00 Arch Linux Importer Affected by VCID-ngzd-mupw-aaas https://security.archlinux.org/AVG-2016 34.0.1
2024-09-18T02:00:35.007101+00:00 Arch Linux Importer Affected by VCID-2zq2-qsgf-aaaj https://security.archlinux.org/AVG-1995 34.0.1
2024-09-18T02:00:34.979847+00:00 Arch Linux Importer Affected by VCID-tz5z-xncu-aaaf https://security.archlinux.org/AVG-1995 34.0.1
2024-01-31T12:09:56.207027+00:00 Arch Linux Importer Affected by VCID-2zq2-qsgf-aaaj https://security.archlinux.org/AVG-1995 34.0.0rc2
2024-01-31T12:09:56.185021+00:00 Arch Linux Importer Affected by VCID-tz5z-xncu-aaaf https://security.archlinux.org/AVG-1995 34.0.0rc2
2024-01-03T22:28:28.147382+00:00 Arch Linux Importer Affected by VCID-ngzd-mupw-aaas https://security.archlinux.org/AVG-2016 34.0.0rc1
2024-01-03T22:26:51.624702+00:00 Arch Linux Importer Affected by VCID-2zq2-qsgf-aaaj https://security.archlinux.org/AVG-1995 34.0.0rc1
2024-01-03T22:26:51.602710+00:00 Arch Linux Importer Affected by VCID-tz5z-xncu-aaaf https://security.archlinux.org/AVG-1995 34.0.0rc1