curl 7.7 through 7.76.1 suffers from an information disclosure when the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
[
{
"target": {
"file": "sql/item_sum.cc",
"function": "Item_ntile::fix_fields"
},
"id": "CVE-2021-22898-3a3afa13",
"source": "https://github.com/mysql/mysql-server/commit/98b2ccb470de120d36bc4a623c814cdfded958ec",
"digest": {
"length": 164.0,
"function_hash": "151132652176240636847836380669942588961"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
},
{
"target": {
"file": "sql/item_sum.h"
},
"id": "CVE-2021-22898-b466ba2c",
"source": "https://github.com/mysql/mysql-server/commit/98b2ccb470de120d36bc4a623c814cdfded958ec",
"digest": {
"threshold": 0.9,
"line_hashes": [
"77377636987516944716339593611926856803",
"142305612386154007679493547611883749558",
"28963515312630878181069270734519432484",
"189136154787345778069113967453357263064",
"279825870249106404218276981844202046255",
"49834063100662448344239531338010457862",
"305324677266273514331621360994794102163",
"291539385034554585704690285934398658292",
"236290264454280366434563539014838479614",
"141317470226054596320765560831766974514",
"293246036016278744162797714460506529443",
"122395028490668685882586271524119445319",
"284458543644346001938693822336726309792",
"235525345452044799367912843591411764217",
"165750678219403994129886011648698991884"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
},
{
"target": {
"file": "sql/item_sum.cc",
"function": "Item_func_group_concat::fix_fields"
},
"id": "CVE-2021-22898-c1e56b4a",
"source": "https://github.com/mysql/mysql-server/commit/98b2ccb470de120d36bc4a623c814cdfded958ec",
"digest": {
"length": 2099.0,
"function_hash": "289288981748901423130195206259685444645"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
},
{
"target": {
"file": "sql/item_sum.cc"
},
"id": "CVE-2021-22898-e0665040",
"source": "https://github.com/mysql/mysql-server/commit/98b2ccb470de120d36bc4a623c814cdfded958ec",
"digest": {
"threshold": 0.9,
"line_hashes": [
"128532828239806081815173253903495399937",
"185178342391912730906413602950301399845",
"97073121848381340882801958057414112130",
"21787205664934285124213972897648826910",
"210360094889580693759307439820673316785",
"91968359554667373632799823213263885280",
"204786958800992693528587719972879106019",
"336835840659383473680709084941686065983",
"231712879563153787737540134928862224841",
"323967078698100139790231535302074881119",
"60799587189103250276527900071006429076",
"141679927460555707293407627171615006659",
"319137299000429162692642899254402106810"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-22898.json"