Your submission was sent successfully! Close

CVE-2021-22945

Published: 15 September 2021

When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.

Priority

Medium

CVSS 3 base score: 9.1

Status

Package Release Status
curl
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri)
Released (7.74.0-1.3ubuntu2)
Ubuntu 21.04 (Hirsute Hippo)
Released (7.74.0-1ubuntu2.3)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(7.68.0-1ubuntu2.6)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(7.58.0-2ubuntu3.14)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(7.47.0-1ubuntu2.19)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(7.35.0-1ubuntu2.20+esm7)

Notes

AuthorNote
amurray
MQTT sending support is only present in curl >= 7.70 - see Message-ID: <nycvar.QRO.7.76.2109061032590.1742@fvyyl>

References