CVE-2021-22925

Updated: 2025-08-20 00:11:12.730444

Description:

curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x MEDIUM 5.0
CVSS Version 3.x MEDIUM 5.3

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Debian 10 ELS curl 7.64.0 5.3 MEDIUM Ignored 2025-10-11 00:23:38 Ignored due to low severity
Oracle Linux 6 ELS mysql 5.1.73 5.3 MEDIUM Ignored 2022-07-18 11:44:12 Ignored due to low severity
Oracle Linux 6 ELS curl 7.19.7 5.3 MEDIUM Released CLSA-2021:1634922517 2022-03-10 14:51:08 Ignored due to low severity
Ubuntu 16.04 ELS curl 7.47.0 5.3 MEDIUM Released CLSA-2021:1635459174 2022-03-10 14:51:08
Ubuntu 16.04 ELS mysql-5.7 5.7.33-0 5.3 MEDIUM Not Vulnerable 2023-03-13 14:12:25
Ubuntu 18.04 ELS mysql-5.7 5.7.41-0 5.3 MEDIUM Ignored 2023-07-10 03:59:58 Ignored due to low severity
Ubuntu 18.04 ELS curl 7.58.0-2 5.3 MEDIUM Ignored 2023-03-02 04:04:20 Ignored due to low severity
Total: 17