Search for packages
purl | pkg:alpm/archlinux/curl@7.76.1-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-2zq2-qsgf-aaaj
Aliases: CVE-2021-22898 |
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol. |
Affected by 4 other vulnerabilities. |
VCID-ngzd-mupw-aaas
Aliases: CVE-2021-22897 |
curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly. |
Affected by 4 other vulnerabilities. |
VCID-tz5z-xncu-aaaf
Aliases: CVE-2021-22901 |
curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory. |
Affected by 4 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:47:04.006987+00:00 | Arch Linux Importer | Affected by | VCID-ngzd-mupw-aaas | https://security.archlinux.org/AVG-2016 | 36.0.0 |
2025-03-28T07:45:36.690359+00:00 | Arch Linux Importer | Affected by | VCID-2zq2-qsgf-aaaj | https://security.archlinux.org/AVG-1995 | 36.0.0 |
2025-03-28T07:45:36.671174+00:00 | Arch Linux Importer | Affected by | VCID-tz5z-xncu-aaaf | https://security.archlinux.org/AVG-1995 | 36.0.0 |
2024-10-20T17:34:01.288809+00:00 | Arch Linux Importer | Affected by | VCID-2zq2-qsgf-aaaj | https://security.archlinux.org/AVG-1995 | 34.0.2 |
2024-10-20T17:34:01.262171+00:00 | Arch Linux Importer | Affected by | VCID-tz5z-xncu-aaaf | https://security.archlinux.org/AVG-1995 | 34.0.2 |
2024-09-18T02:02:27.144204+00:00 | Arch Linux Importer | Affected by | VCID-ngzd-mupw-aaas | https://security.archlinux.org/AVG-2016 | 34.0.1 |
2024-09-18T02:00:35.007101+00:00 | Arch Linux Importer | Affected by | VCID-2zq2-qsgf-aaaj | https://security.archlinux.org/AVG-1995 | 34.0.1 |
2024-09-18T02:00:34.979847+00:00 | Arch Linux Importer | Affected by | VCID-tz5z-xncu-aaaf | https://security.archlinux.org/AVG-1995 | 34.0.1 |
2024-01-31T12:09:56.207027+00:00 | Arch Linux Importer | Affected by | VCID-2zq2-qsgf-aaaj | https://security.archlinux.org/AVG-1995 | 34.0.0rc2 |
2024-01-31T12:09:56.185021+00:00 | Arch Linux Importer | Affected by | VCID-tz5z-xncu-aaaf | https://security.archlinux.org/AVG-1995 | 34.0.0rc2 |
2024-01-03T22:28:28.147382+00:00 | Arch Linux Importer | Affected by | VCID-ngzd-mupw-aaas | https://security.archlinux.org/AVG-2016 | 34.0.0rc1 |
2024-01-03T22:26:51.624702+00:00 | Arch Linux Importer | Affected by | VCID-2zq2-qsgf-aaaj | https://security.archlinux.org/AVG-1995 | 34.0.0rc1 |
2024-01-03T22:26:51.602710+00:00 | Arch Linux Importer | Affected by | VCID-tz5z-xncu-aaaf | https://security.archlinux.org/AVG-1995 | 34.0.0rc1 |