A heap-based buffer overflow in cURL might allow remote attackers to execute arbitrary code.
|Package||net-misc/curl on all architectures|
|Affected versions||< 7.61.0|
|Unaffected versions||>= 7.61.0|
A command line tool and library for transferring data with URLs.
A heap-based buffer overflow was discovered in cURL’s Curl_smtp_escape_eob() function.
An attacker could cause a Denial of Service condition or execute arbitrary code via SMTP connections.
There is no known workaround at this time.
All cURL users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/curl-7.61.0"
July 29, 2018
July 29, 2018: 1