Advisory Database
  • Advisories
  • Dependency Scanning
  1. conan
  2. ›
  3. libcurl
  4. ›
  5. CVE-2021-22924

CVE-2021-22924: Use of Incorrectly-Resolved Name or Reference

August 5, 2021 (updated November 9, 2023)

libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function does not take issuercert into account and it compared the involved paths case insensitively, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn’t include the issuer cert which a transfer can set to qualify how to verify the server certificate.

References

  • hackerone.com/reports/1223565
  • nvd.nist.gov/vuln/detail/CVE-2021-22924

Code Behaviors & Features

Detect and mitigate CVE-2021-22924 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 7.10.4 before 7.77.0

Fixed versions

  • 7.77.0

Solution

Upgrade to version 7.77.0 or above.

Impact 3.7 LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-706: Use of Incorrectly-Resolved Name or Reference

Source file

conan/libcurl/CVE-2021-22924.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:38 +0000.