Description
Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape,
(3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before
7.50.3 allow attackers to have unspecified impact via a string of length
0xffffffff, which triggers a heap-based buffer overflow.
Package
Upstream: | released
(7.50.3)
|
Ubuntu 16.04 ESM: | released
(7.47.0-1ubuntu2.2)
|
Ubuntu 14.04 ESM: | released
(7.35.0-1ubuntu2.10)
|
Patches:
Updated: 2022-04-13 12:30:33 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)