|
|
Log in / Subscribe / Register

Mageia alert MGASA-2016-0316 (curl)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2016-0316: Updated curl packages fix security vulnerability
Date:  Wed, 21 Sep 2016 22:39:01 +0200
Message-ID:  <20160921203901.9DF879F776@duvel.mageia.org>

MGASA-2016-0316 - Updated curl packages fix security vulnerability Publication date: 21 Sep 2016 URL: http://advisories.mageia.org/MGASA-2016-0316.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-7167 Description: The four libcurl functions curl_escape(), curl_easy_escape(), curl_unescape and curl_easy_unescape perform string URL percent escaping and unescaping. They accept custom string length inputs in signed integer arguments. The provided string length arguments were not properly checked and due to arithmetic in the functions, passing in the length 0xffffffff (2^32-1 or UINT_MAX or even just -1) would end up causing an allocation of zero bytes of heap memory that curl would attempt to write gigabytes of data into (CVE-2016-7167). References: - https://bugs.mageia.org/show_bug.cgi?id=19360 - https://curl.haxx.se/docs/adv_20160914.html - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167 SRPMS: - 5/core/curl-7.40.0-3.5.mga5


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds