CVE Vulnerabilities

CVE-2021-22924

Use of Incorrectly-Resolved Name or Reference

Published: Aug 05, 2021 | Modified: Mar 27, 2024
CVSS 3.x
3.7
LOW
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
3.7 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Ubuntu
MEDIUM

libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take issuercert into account and it compared the involved paths case insensitively,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didnt include the issuer cert which a transfer can setto qualify how to verify the server certificate.

Weakness

The product uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.

Affected Software

Name Vendor Start Version End Version
Libcurl Haxx 7.10.4 (including) 7.77.0 (excluding)
.NET Core on Red Hat Enterprise Linux RedHat rh-dotnet31-curl-0:7.61.1-22.el7_9 *
Red Hat Enterprise Linux 8 RedHat curl-0:7.61.1-18.el8_4.1 *
Curl Ubuntu bionic *
Curl Ubuntu devel *
Curl Ubuntu esm-infra-legacy/trusty *
Curl Ubuntu esm-infra/xenial *
Curl Ubuntu focal *
Curl Ubuntu groovy *
Curl Ubuntu hirsute *
Curl Ubuntu impish *
Curl Ubuntu jammy *
Curl Ubuntu kinetic *
Curl Ubuntu lunar *
Curl Ubuntu trusty *
Curl Ubuntu trusty/esm *
Curl Ubuntu upstream *
Curl Ubuntu xenial *

References