Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-22945

Опубликовано: 23 сент. 2021
Источник: debian
EPSS Низкий

Описание

When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
curlfixed7.79.1-1package
curlnot-affectedbusterpackage
curlnot-affectedstretchpackage

Примечания

  • https://curl.se/docs/CVE-2021-22945.html

  • Fixed by: https://github.com/curl/curl/commit/43157490a5054bd24256fe12876931e8abc9df49 (curl-7_79_0)

EPSS

Процентиль: 68%
0.00574
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
больше 3 лет назад

When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.

CVSS3: 9.1
redhat
почти 4 года назад

When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.

CVSS3: 9.1
nvd
больше 3 лет назад

When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.

CVSS3: 9.1
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 9.1
github
около 3 лет назад

When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.

EPSS

Процентиль: 68%
0.00574
Низкий