Hide Forgot
CVE-2021-22898: TELNET stack contents disclosure (see bug 1964887) issue was recently reported for curl and it was addressed in curl 7.77.0: https://curl.se/docs/CVE-2021-22898.html https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde https://hackerone.com/reports/1176461 However, the fix applied is not correct and does not completely address the issue. It helps in cases when long environment variable name is used ('a'*256 + ',b'), but not when the name is short and only the value is long ('a,' + 'b'*256, which is the example mentioned in the curl project advisory). Long variable values still trigger memory disclosure as described in the original report. This issue was reported upstream via: https://hackerone.com/reports/1223882
Created curl tracking bugs for this issue: Affects: fedora-all [bug 1984328] Created mingw-curl tracking bugs for this issue: Affects: fedora-all [bug 1984329]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4511 https://access.redhat.com/errata/RHSA-2021:4511
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-22925
Upstream advisory: https://curl.se/docs/CVE-2021-22925.html