[SECURITY] [DLA 1195-1] curl security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Package : curl
Version : 7.26.0-1+wheezy23
CVE ID : CVE-2017-8817
CVE-2017-8817
Fuzzing by the OSS-Fuzz project led to the discovery of a read out of
bounds flaw in the FTP wildcard function in libcurl. A malicious
server could redirect a libcurl-based client to an URL using a
wildcard pattern, triggering the out-of-bound read.
For Debian 7 "Wheezy", these problems have been fixed in version
7.26.0-1+wheezy23.
We recommend that you upgrade your curl packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=WFJK
-----END PGP SIGNATURE-----
Reply to: