[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2023-1 curl -- buffer overflow

ID: oval:org.secpod.oval:def:600047Date: (C)2011-01-28   (M)2022-10-10
Class: PATCHFamily: unix




Wesley Miaw discovered that libcurl, a multi-protocol file transfer library, is prone to a buffer overflow via the callback function when an application relies on libcurl to automatically uncompress data. Note that this only affects applications that trust libcurl"s maximum limit for a fixed buffer size and do not perform any sanity checks themselves. For the stable distribution , this problem has been fixed in version 7.18.2-8lenny4. Due to a problem with the archive software, we are unable to release all architectures simultaneously. Binaries for the hppa, ia64, mips, mipsel and s390 architectures will be provided once they are available. For the testing distribution and the unstable distribution , this problem has been fixed in version 7.20.0-1. We recommend that you upgrade your curl packages.

Platform:
Debian 5.0
Product:
curl
Reference:
DSA-2023-1
CVE-2010-0734
CVE    1
CVE-2010-0734
CPE    1
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies