- Offizieller Beitrag
Package : curl
CVE ID : CVE-2018-1000301
Debian Bug : 898856
OSS-fuzz, assisted by Max Dymond, discovered that cURL, an URL transfer
library, could be tricked into reading data beyond the end of a heap
based buffer when parsing invalid headers in an RTSP response.
For the oldstable distribution (jessie), this problem has been fixed
in version 7.38.0-4+deb8u11.
For the stable distribution (stretch), this problem has been fixed in
version 7.52.1-5+deb9u6.
We recommend that you upgrade your curl packages.
For the detailed security status of curl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/curl
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/