{"id":"AZL-6358","summary":"CVE-2021-22897 affecting package curl for versions less than 7.76.0-5","details":"curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.","modified":"2026-04-01T05:20:47.376954Z","published":"2021-06-11T16:15:10Z","upstream":["CVE-2021-22897"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22897"}],"affected":[{"package":{"name":"curl","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/curl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.76.0-5"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-6358.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}