Описание
The libcurl API function called curl_maprintf() before version 7.51.0 can be tricked into doing a double-free due to an unsafe size_t multiplication, on systems using 32 bit size_t variables.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 7.50.1-1ubuntu2 |
| esm-infra-legacy/trusty | released | 7.35.0-1ubuntu2.10 |
| esm-infra/xenial | released | 7.47.0-1ubuntu2.2 |
| precise | released | 7.22.0-3ubuntu4.17 |
| precise/esm | not-affected | 7.22.0-3ubuntu4.17 |
| trusty | released | 7.35.0-1ubuntu2.10 |
| trusty/esm | released | 7.35.0-1ubuntu2.10 |
| upstream | released | 7.51.0 |
| vivid/stable-phone-overlay | ignored | end of life |
| vivid/ubuntu-core | released | 7.38.0-3ubuntu2.4 |
Показывать по
EPSS
7.5 High
CVSS2
5.3 Medium
CVSS3
Связанные уязвимости
The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.
The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.
The libcurl API function called `curl_maprintf()` before version 7.51. ...
The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.
EPSS
7.5 High
CVSS2
5.3 Medium
CVSS3