Source: curl
Version: 7.74.0-1.1
Severity: serious
Tags: security upstream
Justification: security regression from stable
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 7.64.0-4
Control: fixed -1 7.64.0-4+deb10u2

Hi,

The following vulnerability was published for curl, filling it as RC
so it appears on the radar for issues to be fixed before bullseye
release.

CVE-2021-22876[0]:
| curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of
| Private Personal Information to an Unauthorized Actor" by leaking
| credentials in the HTTP Referer: header. libcurl does not strip off
| user credentials from the URL when automatically populating the
| Referer: HTTP request header field in outgoing HTTP requests, and
| therefore risks leaking sensitive data to the server that is the
| target of the second HTTP request.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-22876
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
[1] https://curl.se/docs/CVE-2021-22876.html

Salvatore

Reply via email to