Уязвимость повторного использования освободившейся памяти в "libcurl" при отправке данных на MQTT сервер
Описание
При отправке данных на MQTT сервер, libcurl
иногда сохраняет указатель на уже освобожденную область памяти и использует его в последующих вызовах для отправки данных, а также повторно освобождает ее.
Затронутые версии ПО
- libcurl версии до 7.73.0 и 7.78.0
Тип уязвимости
- Уязвимость типа "использование после освобождения" (use-after-free)
- Двойное освобождение памяти
- Повторное использование освобожденного указателя
Ссылки
- Mailing ListThird Party Advisory
- PatchThird Party Advisory
- ExploitPatchThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- Mailing ListThird Party Advisory
- PatchThird Party Advisory
- ExploitPatchThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одно из
EPSS
9.1 Critical
CVSS3
5.8 Medium
CVSS2
Дефекты
Связанные уязвимости
When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.
When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.
When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 coul ...
When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.
EPSS
9.1 Critical
CVSS3
5.8 Medium
CVSS2