CVE-2021-22901 log

Source
Severity High
Remote Yes
Type Arbitrary code execution
Description
libcurl before version 7.77.0 can be tricked into using already freed memory when a new TLS session is negotiated or a client certificate is requested on an existing connection. For example, this can happen when a TLS server requests a client certificate on a connection that was established without one. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. The flaw can only happen in libcurl built to use OpenSSL.
Group Package Affected Fixed Severity Status Ticket
AVG-1998 lib32-libcurl-compat 7.76.1-1 7.77.0-1 High Fixed
AVG-1997 libcurl-compat 7.76.1-1 7.77.0-1 High Fixed
AVG-1996 lib32-curl 7.76.1-1 7.77.0-1 High Fixed
AVG-1995 curl 7.76.1-1 7.77.0-1 High Fixed
Date Advisory Group Package Severity Type
01 Jun 2021 ASA-202106-7 AVG-1998 lib32-libcurl-compat High multiple issues
01 Jun 2021 ASA-202106-6 AVG-1997 libcurl-compat High multiple issues
01 Jun 2021 ASA-202106-5 AVG-1996 lib32-curl High multiple issues
01 Jun 2021 ASA-202106-4 AVG-1995 curl High multiple issues
References
https://curl.se/docs/CVE-2021-22901.html
https://github.com/curl/curl/commit/7f4a9a9b2a49547eae24d2e19bc5c346e9026479