curl 7.7 through 7.76.1 suffers from an information disclosure when the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
[
    {
        "source": "https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "61856253574400304251431398167931381325",
                "240827579168948696521027871241596897491",
                "110949695118154885913644981527849872064",
                "233170882117233154983717156358912138949"
            ]
        },
        "target": {
            "file": "lib/telnet.c"
        },
        "id": "CVE-2021-22898-462dbdfc",
        "signature_version": "v1",
        "signature_type": "Line"
    },
    {
        "source": "https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde",
        "deprecated": false,
        "digest": {
            "function_hash": "278374588349917216130301655130053651655",
            "length": 2157.0
        },
        "target": {
            "function": "suboption",
            "file": "lib/telnet.c"
        },
        "id": "CVE-2021-22898-efb2e938",
        "signature_version": "v1",
        "signature_type": "Function"
    }
]