CVE-2021-22923

NameCVE-2021-22923
DescriptionWhen curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
curl (PTS)buster7.64.0-4+deb10u2vulnerable
buster (security)7.64.0-4+deb10u3vulnerable
bullseye7.74.0-1.3+deb11u3vulnerable
bullseye (security)7.74.0-1.3+deb11u2vulnerable
bookworm, sid7.85.0-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
curlsource(unstable)(unfixed)unimportant

Notes

https://curl.se/docs/CVE-2021-22923.html
https://www.openwall.com/lists/oss-security/2021/07/21/2
The fix for earlier versions is to rebuild curl with the metalink support
switched off.
Metalink support not enabled in Debian builds.

Search for package or bug name: Reporting problems