Debian Security Advisory DSA-4202-1 email@example.com https://www.debian.org/security/ Alessandro Ghedini May 16, 2018 https://www.debian.org/security/faq
Package : curl CVE ID : CVE-2018-1000301 Debian Bug : 898856
OSS-fuzz, assisted by Max Dymond, discovered that cURL, an URL transfer library, could be tricked into reading data beyond the end of a heap based buffer when parsing invalid headers in an RTSP response.
For the oldstable distribution (jessie), this problem has been fixed in version 7.38.0-4+deb8u11.
For the stable distribution (stretch), this problem has been fixed in version 7.52.1-5+deb9u6.
We recommend that you upgrade your curl packages.
For the detailed security status of curl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/curl
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: firstname.lastname@example.org