Mageia alert MGASA-2016-0316 (curl)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2016-0316: Updated curl packages fix security vulnerability | |
| Date: | Wed, 21 Sep 2016 22:39:01 +0200 | |
| Message-ID: | <20160921203901.9DF879F776@duvel.mageia.org> |
MGASA-2016-0316 - Updated curl packages fix security vulnerability Publication date: 21 Sep 2016 URL: http://advisories.mageia.org/MGASA-2016-0316.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-7167 Description: The four libcurl functions curl_escape(), curl_easy_escape(), curl_unescape and curl_easy_unescape perform string URL percent escaping and unescaping. They accept custom string length inputs in signed integer arguments. The provided string length arguments were not properly checked and due to arithmetic in the functions, passing in the length 0xffffffff (2^32-1 or UINT_MAX or even just -1) would end up causing an allocation of zero bytes of heap memory that curl would attempt to write gigabytes of data into (CVE-2016-7167). References: - https://bugs.mageia.org/show_bug.cgi?id=19360 - https://curl.haxx.se/docs/adv_20160914.html - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167 SRPMS: - 5/core/curl-7.40.0-3.5.mga5
