From e3872864be25f7421015bef2732fa57c0c9fb726 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Sat, 4 Aug 2018 08:53:53 +0100 Subject: gentoo resync : 04.08.2018 --- metadata/glsa/glsa-201807-04.xml | 50 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) create mode 100644 metadata/glsa/glsa-201807-04.xml (limited to 'metadata/glsa/glsa-201807-04.xml') diff --git a/metadata/glsa/glsa-201807-04.xml b/metadata/glsa/glsa-201807-04.xml new file mode 100644 index 000000000000..38cedbc06c3c --- /dev/null +++ b/metadata/glsa/glsa-201807-04.xml @@ -0,0 +1,50 @@ + + + + cURL:Heap-based Buffer Overflow + A heap-based buffer overflow in cURL might allow remote attackers + to execute arbitrary code. + + curl + 2018-07-29 + 2018-07-29 + 660894 + remote + + + 7.61.0 + 7.61.0 + + + +

A command line tool and library for transferring data with URLs.

+ +
+ +

A heap-based buffer overflow was discovered in cURL’s + Curl_smtp_escape_eob() function. +

+
+ +

An attacker could cause a Denial of Service condition or execute + arbitrary code via SMTP connections. +

+
+ +

There is no known workaround at this time.

+
+ +

All cURL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/curl-7.61.0" + + +
+ + CVE-2018-0500 + + irishluck83 + irishluck83 +
-- cgit v1.2.3