The libcurl API function `curl_maprintf()` before version 7.51.0 can be tricked into a double-free due to unsafe `size_t` multiplication on 32 bit systems
Reporter | Title | Published | Views | Family All 111 |
---|---|---|---|---|
![]() | Double free | 31 Jul 201821:29 | – | prion |
![]() | CVE-2016-8618 | 31 Jul 201821:29 | – | cve |
![]() | CURL-CVE-2016-8618 double free in curl_maprintf | 2 Nov 201608:00 | – | osv |
![]() | CVE-2016-8618 | 31 Jul 201821:29 | – | osv |
![]() | DLA-711-1 curl - security update | 17 Nov 201600:00 | – | osv |
![]() | DSA-3705-1 curl - security update | 3 Nov 201600:00 | – | osv |
![]() | SUSE-SU-2016:2714-1 Security update for curl | 3 Nov 201610:58 | – | osv |
![]() | SUSE-SU-2016:2699-1 Security update for curl | 2 Nov 201611:08 | – | osv |
![]() | SUSE-SU-2016:2700-1 Security update for curl | 2 Nov 201611:07 | – | osv |
![]() | MGASA-2018-0053 Updated curl packages fix security vulnerability | 3 Jan 201816:40 | – | osv |
Source | Link |
---|---|
curl | www.curl.haxx.se/docs/adv_20161102D.html |
bugzilla | www.bugzilla.redhat.com/show_bug.cgi |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo