A vulnerability was found in curl where, due to flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server. Therefore potentially revealing sensitive internal information to the server using a clear-text network protocol.
Upstream advisory: https://curl.se/docs/CVE-2021-22898.html Upstream commit: https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
Created curl tracking bugs for this issue: Affects: fedora-all [bug 1964923] Created mingw-curl tracking bugs for this issue: Affects: fedora-all [bug 1964924]
This issue can only be triggered when curl is using the telnet protocol. It also requires that curl is configured (using the -t / --telnet-option command line option for the curl command line tool, or using the libcurl library's CURLOPT_TELNETOPTIONS option) to send NEW_ENV telnet option with long (more than 127 characters) environment variable name or value. If server requests curl to send environment variables during the telnet connection handshake, a limited amount of curl's stack memory is included in the response sent to the server. Telnet server can not trigger this flaw without this required curl configuration. In affected configurations, the leak is triggered by a non-malicious telnet server, it's sufficient to the server to ask client to send environment variables.
HackerOne report: https://hackerone.com/reports/1176461
@thoger I'm seeing that all of our curl versions are < 7.7. Is this CVE relevant to us.
(In reply to Michael Johnson from comment #9) > I'm seeing that all of our curl versions are < 7.7. Versions as 7.61.1 (RHEL-8), 7.29.0 (RHEL-7), 7.19.7 (RHEL-6), and 7.15.5 (RHEL-5) are all > 7.7. Do not confuse 7.7 with 7.70 or 7.77. 7.7 was released back in 2001 - it's really ancient and older versions are not likely to be used anywhere these days. https://curl.se/changes.html#7_7
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4511 https://access.redhat.com/errata/RHSA-2021:4511
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-22898