CVE-2021-22924 (CNNVD-202107-1569)
中文标题:
libcurl 资源管理错误漏洞
英文标题:
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if ...
漏洞描述
中文描述:
libcurl是一款用于从服务器传输数据或向服务器传输数据的工具。 libcurl 中存在资源管理错误漏洞,该漏洞源于存在逻辑错误,可能导致libcurl 重用错误的连接。
英文描述:
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| haxx | libcurl | * | - | - |
cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 33 | - | - |
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 10.0 | - | - |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 11.0 | - | - |
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
|
| netapp | cloud_backup | - | - | - |
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
|
| netapp | clustered_data_ontap | - | - | - |
cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
|
| netapp | solidfire_\&_hci_management_node | - | - | - |
cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:*
|
| netapp | solidfire_baseboard_management_controller_firmware | - | - | - |
cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*
|
| oracle | mysql_server | * | - | - |
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
| oracle | peoplesoft_enterprise_peopletools | 8.57 | - | - |
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
|
| oracle | peoplesoft_enterprise_peopletools | 8.58 | - | - |
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
|
| oracle | peoplesoft_enterprise_peopletools | 8.59 | - | - |
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*
|
| siemens | sinec_infrastructure_network_services | * | - | - |
cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*
|
| siemens | sinema_remote_connect_server | * | - | - |
cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*
|
| siemens | logo\!_cmr2040_firmware | * | - | - |
cpe:2.3:o:siemens:logo\!_cmr2040_firmware:*:*:*:*:*:*:*:*
|
| siemens | logo\!_cmr2020_firmware | * | - | - |
cpe:2.3:o:siemens:logo\!_cmr2020_firmware:*:*:*:*:*:*:*:*
|
| siemens | ruggedcomrm_1224_lte_firmware | * | - | - |
cpe:2.3:o:siemens:ruggedcomrm_1224_lte_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_m804pb_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_m804pb_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_m812-1_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_m812-1_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_m816-1_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_m816-1_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_m826-2_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_m826-2_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_m874-2_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_m874-2_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_m874-3_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_m874-3_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_m876-3_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_m876-3_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_m876-4_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_m876-4_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_mum856-1_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_mum856-1_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_s615_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:*
|
| siemens | simatic_cp_1543-1_firmware | * | - | - |
cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*
|
| siemens | simatic_cp_1545-1_firmware | * | - | - |
cpe:2.3:o:siemens:simatic_cp_1545-1_firmware:*:*:*:*:*:*:*:*
|
| siemens | simatic_rtu3010c_firmware | * | - | - |
cpe:2.3:o:siemens:simatic_rtu3010c_firmware:*:*:*:*:*:*:*:*
|
| siemens | simatic_rtu3030c_firmware | * | - | - |
cpe:2.3:o:siemens:simatic_rtu3030c_firmware:*:*:*:*:*:*:*:*
|
| siemens | simatic_rtu3031c_firmware | * | - | - |
cpe:2.3:o:siemens:simatic_rtu3031c_firmware:*:*:*:*:*:*:*:*
|
| siemens | simatic_rtu_3041c_firmware | * | - | - |
cpe:2.3:o:siemens:simatic_rtu_3041c_firmware:*:*:*:*:*:*:*:*
|
| siemens | sinema_remote_connect | * | - | - |
cpe:2.3:a:siemens:sinema_remote_connect:*:*:*:*:*:*:*:*
|
| siemens | siplus_net_cp_1543-1_firmware | * | - | - |
cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*
|
| splunk | universal_forwarder | * | - | - |
cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
|
| splunk | universal_forwarder | 9.1.0 | - | - |
cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
3.1 (adp)
LOWCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-22924 |
2025-11-11 15:20:49 | 2025-11-11 07:36:40 |
| NVD | nvd_CVE-2021-22924 |
2025-11-11 14:57:40 | 2025-11-11 07:45:00 |
| CNNVD | cnnvd_CNNVD-202107-1569 |
2025-11-11 15:10:41 | 2025-11-11 07:56:48 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 资源管理错误
- cnnvd_id: 未提取 -> CNNVD-202107-1569
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 0 -> 38
- data_sources: ['cve'] -> ['cve', 'nvd']