[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1195-1] curl security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : curl
Version        : 7.26.0-1+wheezy23
CVE ID         : CVE-2017-8817


CVE-2017-8817

    Fuzzing by the OSS-Fuzz project led to the discovery of a read out of
    bounds flaw in the FTP wildcard function in libcurl. A malicious
    server could redirect a libcurl-based client to an URL using a
    wildcard pattern, triggering the out-of-bound read.


For Debian 7 "Wheezy", these problems have been fixed in version
7.26.0-1+wheezy23.

We recommend that you upgrade your curl packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=WFJK
-----END PGP SIGNATURE-----


Reply to: